Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup.exe

Overview

General Information

Sample name:Setup.exe
Analysis ID:1618058
MD5:ebca499e1ad0c9c61ca78571e7201b75
SHA1:dbb72e4c2bd38ccc509b4705c07ed5a84ed0e156
SHA256:25f8797d40120ef9c308d5301fe4e17f4a46ce6c85ffb40d3fedf95ed581e9bd
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries keyboard layouts
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Setup.exe (PID: 5024 cmdline: "C:\Users\user\Desktop\Setup.exe" MD5: EBCA499E1AD0C9C61CA78571E7201B75)
    • Setup.tmp (PID: 3916 cmdline: "C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp" /SL5="$30446,10869927,119296,C:\Users\user\Desktop\Setup.exe" MD5: B1F9D665E52C29972B50D7145D88DCE1)
      • Setup.exe (PID: 4912 cmdline: "C:\Users\user\Desktop\Setup.exe" /VERYSILENT MD5: EBCA499E1AD0C9C61CA78571E7201B75)
        • Setup.tmp (PID: 7124 cmdline: "C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp" /SL5="$20452,10869927,119296,C:\Users\user\Desktop\Setup.exe" /VERYSILENT MD5: B1F9D665E52C29972B50D7145D88DCE1)
          • PilotEdit.exe (PID: 3068 cmdline: "C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe" MD5: 0D9B524228544CB2C010A34B20C1D31F)
  • cleanup
{"C2 url": ["balancedzlife.tech", "shiningrstars.help", "mercharena.biz", "generalmills.pro", "stormlegue.com", "blast-hubs.com", "blastikcn.com", "nestlecompany.pro"], "Build id": "iK8vKf--seh1"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        Process Memory Space: PilotEdit.exe PID: 3068JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
          Process Memory Space: PilotEdit.exe PID: 3068JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:14.435341+010020283713Unknown Traffic192.168.2.1049711149.154.167.99443TCP
            2025-02-18T15:40:15.367297+010020283713Unknown Traffic192.168.2.1049712104.21.64.1443TCP
            2025-02-18T15:40:16.207812+010020283713Unknown Traffic192.168.2.1049713104.21.64.1443TCP
            2025-02-18T15:40:17.655869+010020283713Unknown Traffic192.168.2.1049714104.21.64.1443TCP
            2025-02-18T15:40:19.635980+010020283713Unknown Traffic192.168.2.1049716104.21.64.1443TCP
            2025-02-18T15:40:21.316306+010020283713Unknown Traffic192.168.2.1049717104.21.64.1443TCP
            2025-02-18T15:40:23.467862+010020283713Unknown Traffic192.168.2.1049718104.21.64.1443TCP
            2025-02-18T15:40:26.301615+010020283713Unknown Traffic192.168.2.1049719104.21.64.1443TCP
            2025-02-18T15:40:28.875093+010020283713Unknown Traffic192.168.2.1049720104.21.64.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:15.513486+010020546531A Network Trojan was detected192.168.2.1049712104.21.64.1443TCP
            2025-02-18T15:40:16.749580+010020546531A Network Trojan was detected192.168.2.1049713104.21.64.1443TCP
            2025-02-18T15:40:29.417772+010020546531A Network Trojan was detected192.168.2.1049720104.21.64.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:15.513486+010020498361A Network Trojan was detected192.168.2.1049712104.21.64.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:15.367297+010020600791Domain Observed Used for C2 Detected192.168.2.1049712104.21.64.1443TCP
            2025-02-18T15:40:16.207812+010020600791Domain Observed Used for C2 Detected192.168.2.1049713104.21.64.1443TCP
            2025-02-18T15:40:17.655869+010020600791Domain Observed Used for C2 Detected192.168.2.1049714104.21.64.1443TCP
            2025-02-18T15:40:19.635980+010020600791Domain Observed Used for C2 Detected192.168.2.1049716104.21.64.1443TCP
            2025-02-18T15:40:21.316306+010020600791Domain Observed Used for C2 Detected192.168.2.1049717104.21.64.1443TCP
            2025-02-18T15:40:23.467862+010020600791Domain Observed Used for C2 Detected192.168.2.1049718104.21.64.1443TCP
            2025-02-18T15:40:26.301615+010020600791Domain Observed Used for C2 Detected192.168.2.1049719104.21.64.1443TCP
            2025-02-18T15:40:28.875093+010020600791Domain Observed Used for C2 Detected192.168.2.1049720104.21.64.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:14.821884+010020600661Domain Observed Used for C2 Detected192.168.2.10553381.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:14.808129+010020600721Domain Observed Used for C2 Detected192.168.2.10554801.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:14.795999+010020601041Domain Observed Used for C2 Detected192.168.2.10518901.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:14.841163+010020600781Domain Observed Used for C2 Detected192.168.2.10500721.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T15:40:18.405742+010020480941Malware Command and Control Activity Detected192.168.2.1049714104.21.64.1443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://stormlegue.com/apieAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/apinAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/apiiAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/apiduAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/apiAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/zAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/apilAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/GmcgAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/ptOBAvira URL Cloud: Label: malware
            Source: https://balancedzlife.tech:443/api-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerno-cachePragmAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/kAvira URL Cloud: Label: malware
            Source: https://balancedzlife.tech/AAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/oAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/lAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/Avira URL Cloud: Label: malware
            Source: https://balancedzlife.tech/Avira URL Cloud: Label: malware
            Source: balancedzlife.techAvira URL Cloud: Label: malware
            Source: https://stormlegue.com/;Avira URL Cloud: Label: malware
            Source: https://balancedzlife.tech/apiAvira URL Cloud: Label: malware
            Source: https://mercharena.biz/Avira URL Cloud: Label: malware
            Source: https://stormlegue.com/apii1Avira URL Cloud: Label: malware
            Source: https://stormlegue.com/tI89Avira URL Cloud: Label: malware
            Source: https://stormlegue.com/J/i13s6Avira URL Cloud: Label: malware
            Source: https://stormlegue.com/.Avira URL Cloud: Label: malware
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["balancedzlife.tech", "shiningrstars.help", "mercharena.biz", "generalmills.pro", "stormlegue.com", "blast-hubs.com", "blastikcn.com", "nestlecompany.pro"], "Build id": "iK8vKf--seh1"}
            Source: Setup.exeVirustotal: Detection: 25%Perma Link
            Source: Setup.exeReversingLabs: Detection: 37%
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: balancedzlife.tech
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: shiningrstars.help
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: mercharena.biz
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: generalmills.pro
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: stormlegue.com
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: blast-hubs.com
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: blastikcn.com
            Source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmpString decryptor: nestlecompany.pro
            Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.10:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49714 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49716 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49717 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49718 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49719 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49720 version: TLS 1.2
            Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\Tfs.BuildMachine\MS.TF.Deployment.Workflow\Microsoft.TeamFoundation.Deployment.Workflow.pdbX source: is-1BONH.tmp.5.dr
            Source: Binary string: Z:\PROJ\CodeLogic\Release\PilotEdit.pdb source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.dr
            Source: Binary string: D:\a\multipass-private\multipass-private\build\bin\ssh.pdb source: is-IDBJG.tmp.5.dr
            Source: Binary string: NuGet.Common.ni.pdb source: is-JOM36.tmp.5.dr
            Source: Binary string: MpRTP.pdb source: is-B6AOM.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\artifacts\NuGet.PackageManagement\obj\release\net472\NuGet.PackageManagement.pdb source: is-DNNFJ.tmp.5.dr
            Source: Binary string: sqlcese35.pdb source: is-0RUKS.tmp.5.dr
            Source: Binary string: D:\dbs\sh\ddvsm\1001_131954\cmd\l\out\Intermediate\EdevStaticAnalysis\fxcopcommon.csproj_07B774E8\objr\x86\FxCopCommon.pdb source: is-V00IP.tmp.5.dr
            Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\Tfs.BuildMachine\MS.TF.Deployment.Workflow\Microsoft.TeamFoundation.Deployment.Workflow.pdb source: is-1BONH.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\obj\VS\Microsoft.WebTools.ProjectSystem.Components\Release\Microsoft.WebTools.ProjectSystem.Components.pdbZa source: is-3KHUI.tmp.5.dr
            Source: Binary string: F:\NMC\CURRENT260IL1nightlyBuild15061_final\Libraries\WzWXF\Providers\WzWXFRecipients\w64prod\WzAddrycts64.pdb source: is-KU21U.tmp.5.dr
            Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\VSIntegration.Client\MS.VS.TeamFoundation.WorkItemTracking\Microsoft.VisualStudio.TeamFoundation.WorkItemTracking.pdb source: is-1ABE0.tmp.5.dr
            Source: Binary string: MpRTP.pdbUGP source: is-B6AOM.tmp.5.dr
            Source: Binary string: F:\NMC\CURRENT260IL1nightlyBuild15061_final\Libraries\WzWXF\Providers\WzWXFRecipients\w64prod\WzAddrycts64.pdb@` source: is-KU21U.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\artifacts\NuGet.Common\obj\release\netstandard2.0\NuGet.Common.pdb source: is-JOM36.tmp.5.dr
            Source: Binary string: sqlcese35.pdb source: is-0RUKS.tmp.5.dr
            Source: Binary string: D:\a\multipass-private\multipass-private\build\bin\ssh.pdbQQ source: is-IDBJG.tmp.5.dr
            Source: Binary string: Debug information could not be found for target assembly '{0}'. For best analysis results, include the .pdb file with debug information for '{0}' in the same directory as the target assembly. source: is-V00IP.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\obj\VS\Microsoft.WebTools.ProjectSystem.Components\Release\Microsoft.WebTools.ProjectSystem.Components.pdb source: is-3KHUI.tmp.5.dr
            Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: Setup.tmp, 00000002.00000003.1581237433.00000000022B1000.00000004.00001000.00020000.00000000.sdmp, Setup.exe, _isdecmp.dll.2.dr, _isdecmp.dll.5.dr
            Source: Binary string: D:\dbs\sh\ddvsm\0831_165144\cmd\1b\out\Intermediate\vc\microsoft.visualstudio.workspace.externalbuildframework.vs_x86retail_84B3C0EB\Release\net472\Microsoft.VisualStudio.Workspace.ExternalBuildFramework.VS.pdb source: is-9I2OC.tmp.5.dr

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2060078 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stormlegue .com) : 192.168.2.10:50072 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2060072 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mercharena .biz) : 192.168.2.10:55480 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49712 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49713 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060066 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (generalmills .pro) : 192.168.2.10:55338 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49717 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49714 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060104 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shiningrstars .help) : 192.168.2.10:51890 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49716 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49718 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49720 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2060079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stormlegue .com in TLS SNI) : 192.168.2.10:49719 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.10:49713 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.10:49714 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.10:49712 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.10:49712 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.10:49720 -> 104.21.64.1:443
            Source: Malware configuration extractorURLs: balancedzlife.tech
            Source: Malware configuration extractorURLs: shiningrstars.help
            Source: Malware configuration extractorURLs: mercharena.biz
            Source: Malware configuration extractorURLs: generalmills.pro
            Source: Malware configuration extractorURLs: stormlegue.com
            Source: Malware configuration extractorURLs: blast-hubs.com
            Source: Malware configuration extractorURLs: blastikcn.com
            Source: Malware configuration extractorURLs: nestlecompany.pro
            Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
            Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
            Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
            Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49713 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49717 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49712 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49714 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49711 -> 149.154.167.99:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49716 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49718 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49720 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49719 -> 104.21.64.1:443
            Source: global trafficHTTP traffic detected: GET /prolksehr3 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: t.me
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 47Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=FE08AF9MZP25XISX3YCookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12848Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=MQJOEU1LCookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15015Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=UR1I159W0F5T06Cookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20413Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PQ7LRT0SR9TDILSAZPYCookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2393Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=O8K65RX27V9Cookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 567977Host: stormlegue.com
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=FiCte4Nw5yDDf12NGTGGy5Rv5EGc0MkTDOeV3TSFB_Y-1739889615-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 81Host: stormlegue.com
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /prolksehr3 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: t.me
            Source: global trafficDNS traffic detected: DNS query: t.me
            Source: global trafficDNS traffic detected: DNS query: balancedzlife.tech
            Source: global trafficDNS traffic detected: DNS query: shiningrstars.help
            Source: global trafficDNS traffic detected: DNS query: mercharena.biz
            Source: global trafficDNS traffic detected: DNS query: generalmills.pro
            Source: global trafficDNS traffic detected: DNS query: stormlegue.com
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: stormlegue.com
            Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 18 Feb 2025 14:40:15 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tZ3mUHJlhhFUjpV1CGSUQ67GlV%2BGCPJjH%2F4fP73g1DQAbZuYYmOcGf8eY%2BT1rXZ6nY4d2pVqnV8LiJn%2B2TVSgrIWFTDBEwMMHHf0Fbl08B3iud8urv5LfoRdKPEQTttFUw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913ec5709800c358-EWR
            Source: is-1ABE0.tmp.5.drString found in binary or memory: http://aka.ms/witclientom
            Source: is-1ABE0.tmp.5.drString found in binary or memory: http://aka.ms/witclientome
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: Setup.tmp, 00000005.00000002.1815864920.000000000019C000.00000004.00000010.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: PilotEdit.exe, 00000006.00000003.2060952336.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2063574417.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2258047088.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2258125852.0000000002138000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2829131661.0000000002139000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083162284.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2061313005.0000000002124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
            Source: Setup.tmp, 00000005.00000002.1815864920.000000000019C000.00000004.00000010.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
            Source: Setup.tmp, 00000005.00000002.1815864920.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR4
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
            Source: is-1BONH.tmp.5.drString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
            Source: is-1BONH.tmp.5.drString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
            Source: Setup.tmp, 00000005.00000002.1815864920.000000000019C000.00000004.00000010.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: http://ocsp.comodoca.com0
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0O
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: is-MF6KC.tmp.5.drString found in binary or memory: http://ocsp.sectigo.com0
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://s2.symcb.com0
            Source: is-1BONH.tmp.5.drString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issueshttp://schemas.xmlsoap.org/ws/2005/05/identity/NoP
            Source: is-1BONH.tmp.5.drString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueT
            Source: is-1BONH.tmp.5.drString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueT
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://sv.symcb.com/sv.crt0
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://sv.symcd.com0&
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.chilkatsoft.com/p/p_463.asp)
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.cknotes.com/?p=210
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.cknotes.com/?p=217
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.cknotes.com/?p=411
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.cknotes.com/?p=411The
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.cknotes.com/?p=91
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: is-V00IP.tmp.5.drString found in binary or memory: http://www.gotdotnet.com/5PlatformAssembliesLocation
            Source: Setup.exe, Setup.tmp.0.dr, Setup.tmp.3.drString found in binary or memory: http://www.innosetup.com/
            Source: Setup.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
            Source: is-MF6KC.tmp.5.drString found in binary or memory: http://www.pilotedit.com
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.pilotedit.comopen
            Source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drString found in binary or memory: http://www.pilotedit.comopen0-
            Source: Setup.exe, Setup.tmp.0.dr, Setup.tmp.3.drString found in binary or memory: http://www.remobjects.com/ps
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://www.symauth.com/cps0(
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://www.symauth.com/rpa00
            Source: is-KU21U.tmp.5.drString found in binary or memory: http://www.winzip.com/authenticode.htm0
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: is-1ABE0.tmp.5.drString found in binary or memory: https://aka.ms/teamexplorer2019
            Source: PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://balancedzlife.tech/
            Source: PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://balancedzlife.tech/A
            Source: PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://balancedzlife.tech/api
            Source: PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://balancedzlife.tech:443/api-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerno-cachePragm
            Source: PilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
            Source: PilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: PilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
            Source: PilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
            Source: is-KU21U.tmp.5.drString found in binary or memory: https://d.symcb.com/cps0%
            Source: is-KU21U.tmp.5.drString found in binary or memory: https://d.symcb.com/rpa0
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: is-JOM36.tmp.5.dr, is-DNNFJ.tmp.5.drString found in binary or memory: https://github.com/NuGet/NuGet.Client
            Source: PilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
            Source: is-1BONH.tmp.5.drString found in binary or memory: https://login.microsoftonline.com/extSTS.srf%SPSNoSecurityToken)SPSNoTokenExpiration
            Source: is-1BONH.tmp.5.drString found in binary or memory: https://login.microsoftonline.comXhttps://login.microsoftonline.com/extSTS.srf
            Source: is-1BONH.tmp.5.drString found in binary or memory: https://management.core.windows.net
            Source: PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mercharena.biz/
            Source: PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drString found in binary or memory: https://sectigo.com/CPS0
            Source: PilotEdit.exe, 00000006.00000002.2829000770.00000000020F6000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/
            Source: PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/.
            Source: PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/;
            Source: PilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/Gmcg
            Source: PilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/J/i13s6
            Source: PilotEdit.exe, 00000006.00000003.2083162284.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2829131661.0000000002139000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2257689319.000000000217C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/api
            Source: PilotEdit.exe, 00000006.00000003.2049154075.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/apidu
            Source: PilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/apie
            Source: PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/apii
            Source: PilotEdit.exe, 00000006.00000002.2829202421.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083530809.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083162284.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2257689319.000000000217C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/apii1
            Source: PilotEdit.exe, 00000006.00000003.2258047088.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2258125852.0000000002138000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2829131661.0000000002139000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/apil
            Source: PilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/apin
            Source: PilotEdit.exe, 00000006.00000002.2830302217.0000000004E10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/k
            Source: PilotEdit.exe, 00000006.00000002.2830302217.0000000004E10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/l
            Source: PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/o
            Source: PilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/ptOB
            Source: PilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/tI89
            Source: PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stormlegue.com/z
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/prolksehr3
            Source: PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
            Source: PilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
            Source: PilotEdit.exe, 00000006.00000003.1988233118.0000000002171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
            Source: PilotEdit.exe, 00000006.00000003.1988233118.0000000002171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
            Source: is-KU21U.tmp.5.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: PilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: PilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.10:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49714 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49716 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49717 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49718 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49719 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.10:49720 version: TLS 1.2
            Source: Setup.exeStatic PE information: invalid certificate
            Source: Setup.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
            Source: Setup.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
            Source: Setup.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
            Source: Setup.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
            Source: is-MF6KC.tmp.5.drStatic PE information: Resource name: STYLE type: Zip archive data, at least v2.0 to extract, compression method=store
            Source: is-MF6KC.tmp.5.drStatic PE information: Resource name: STYLE type: Zip archive data, at least v2.0 to extract, compression method=store
            Source: is-JOM36.tmp.5.drStatic PE information: No import functions for PE file found
            Source: Setup.exe, 00000000.00000003.1576803749.000000007FE42000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Setup.exe
            Source: Setup.exeBinary or memory string: OriginalFilenameshfolder.dll~/ vs Setup.exe
            Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: is-B6AOM.tmp.5.drBinary string: \??\Volume\Device\Harddisk\Device\CdRom\Device\Floppy\Device\WinDfs\\Device\RdpDr\\Device\WebDavRedirector\\Device\Mup%ws%ws\Device\LanmanRedirector[MpRtp] Engine VFZ block: %ls. status=0x%x, statusex=0x%I64x, threatid=0x%x, sigseq=0x%I64x[MpRtp] Engine VFZ HIPS block: %ls. status=0x%x, statusex=0x%I64x, threatid=0x%x, sigseq=0x%I64x[MpRtp] Engine VFZ lofi/sample/expensive: %ls. status=0x%x, statusex=0x%I64x, threatid=0x%x, sigseq=0x%I64xvfzselfcheckmagicfile8
            Source: is-B6AOM.tmp.5.drBinary string: REGISTRY_DOMAINFILESYSTEM_DOMAINPROCESS_DOMAINFIREWALL_DOMAINNETWORK_DOMAINSYSTEM_DOMAINNRI_DOMAINAR_DOMAIN\Device\SftVol\File ID\\%s\Device\MountPointManagerN
            Source: is-B6AOM.tmp.5.drBinary string: 4Exclusions\ProcessesMpCmdRun.exeNisSrv.exe%SystemRoot%System32\WerFault.exeSystem32\WerFaultSecure.exeScanDisableScanningNetworkFilesDisableScanningMappedNetworkDrivesForFullScanQuarantineQuarantineLocationEngineParanoidModeInstallLocation.\Device\\SystemRoot\\??\%s\%s\Device\LanmanRedirector\\Device\Mup\%s%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X%s{}%sx@PRegistry\Machine0HKLMHKCUHKCU\Software\Classes
            Source: is-B6AOM.tmp.5.drBinary string: \DEVICE\\.\fileboottransactionfilesamplefilerequestedsamplefileexpensive->%d / %d%c%d%cremoteremovablefixednot boot%ws / %wsPassthrough%dFile ID 0x%016I64x%s%s
            Source: is-1BONH.tmp.5.drBinary or memory string: 8Please specify a Visual Studio Solution (.sln) to build.
            Source: is-1BONH.tmp.5.drBinary or memory string: *.cscfg9CertificateAddedSuccessfully=CertificateDeletedSuccessfully1RenewingCertificateError.sln
            Source: is-3KHUI.tmp.5.drBinary or memory string: .csproj
            Source: is-V00IP.tmp.5.drBinary or memory string: D:\dbs\sh\ddvsm\1001_131954\cmd\l\out\Intermediate\EdevStaticAnalysis\fxcopcommon.csproj_07B774E8\objr\x86\FxCopCommon.pdb
            Source: is-3KHUI.tmp.5.drBinary or memory string: .vbproj'GitHubOrganizations
            Source: is-3KHUI.tmp.5.drBinary or memory string: 7Project Files (*.csproj)|*.csproj|All Files (*.*) | *.*
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/38@6/2
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmpJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
            Source: PilotEdit.exe, 00000006.00000003.1991144520.0000000004E2F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990709819.0000000004E4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Setup.exeVirustotal: Detection: 25%
            Source: Setup.exeReversingLabs: Detection: 37%
            Source: Setup.exeString found in binary or memory: /LOADINF="filename"
            Source: Setup.exeString found in binary or memory: -Helper process exited with failure code: 0x%x
            Source: Setup.exeString found in binary or memory: -HelperRegisterTypeLibrary: StatusCode invalidU
            Source: Setup.exeString found in binary or memory: /LoadInf=
            Source: Setup.exeString found in binary or memory: /InstallOnThisVersion: Invalid MinVersion string
            Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\user\Desktop\Setup.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe"
            Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp "C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp" /SL5="$30446,10869927,119296,C:\Users\user\Desktop\Setup.exe"
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe" /VERYSILENT
            Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp "C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp" /SL5="$20452,10869927,119296,C:\Users\user\Desktop\Setup.exe" /VERYSILENT
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe "C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe"
            Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp "C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp" /SL5="$30446,10869927,119296,C:\Users\user\Desktop\Setup.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe" /VERYSILENTJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp "C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp" /SL5="$20452,10869927,119296,C:\Users\user\Desktop\Setup.exe" /VERYSILENTJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe "C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: acgenral.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: msimg32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: acgenral.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: msimg32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: explorerframe.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: oledlg.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpWindow found: window name: TMainFormJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: Setup.exeStatic file information: File size 12136997 > 1048576
            Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\Tfs.BuildMachine\MS.TF.Deployment.Workflow\Microsoft.TeamFoundation.Deployment.Workflow.pdbX source: is-1BONH.tmp.5.dr
            Source: Binary string: Z:\PROJ\CodeLogic\Release\PilotEdit.pdb source: PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.dr
            Source: Binary string: D:\a\multipass-private\multipass-private\build\bin\ssh.pdb source: is-IDBJG.tmp.5.dr
            Source: Binary string: NuGet.Common.ni.pdb source: is-JOM36.tmp.5.dr
            Source: Binary string: MpRTP.pdb source: is-B6AOM.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\artifacts\NuGet.PackageManagement\obj\release\net472\NuGet.PackageManagement.pdb source: is-DNNFJ.tmp.5.dr
            Source: Binary string: sqlcese35.pdb source: is-0RUKS.tmp.5.dr
            Source: Binary string: D:\dbs\sh\ddvsm\1001_131954\cmd\l\out\Intermediate\EdevStaticAnalysis\fxcopcommon.csproj_07B774E8\objr\x86\FxCopCommon.pdb source: is-V00IP.tmp.5.dr
            Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\Tfs.BuildMachine\MS.TF.Deployment.Workflow\Microsoft.TeamFoundation.Deployment.Workflow.pdb source: is-1BONH.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\obj\VS\Microsoft.WebTools.ProjectSystem.Components\Release\Microsoft.WebTools.ProjectSystem.Components.pdbZa source: is-3KHUI.tmp.5.dr
            Source: Binary string: F:\NMC\CURRENT260IL1nightlyBuild15061_final\Libraries\WzWXF\Providers\WzWXFRecipients\w64prod\WzAddrycts64.pdb source: is-KU21U.tmp.5.dr
            Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\VSIntegration.Client\MS.VS.TeamFoundation.WorkItemTracking\Microsoft.VisualStudio.TeamFoundation.WorkItemTracking.pdb source: is-1ABE0.tmp.5.dr
            Source: Binary string: MpRTP.pdbUGP source: is-B6AOM.tmp.5.dr
            Source: Binary string: F:\NMC\CURRENT260IL1nightlyBuild15061_final\Libraries\WzWXF\Providers\WzWXFRecipients\w64prod\WzAddrycts64.pdb@` source: is-KU21U.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\artifacts\NuGet.Common\obj\release\netstandard2.0\NuGet.Common.pdb source: is-JOM36.tmp.5.dr
            Source: Binary string: sqlcese35.pdb source: is-0RUKS.tmp.5.dr
            Source: Binary string: D:\a\multipass-private\multipass-private\build\bin\ssh.pdbQQ source: is-IDBJG.tmp.5.dr
            Source: Binary string: Debug information could not be found for target assembly '{0}'. For best analysis results, include the .pdb file with debug information for '{0}' in the same directory as the target assembly. source: is-V00IP.tmp.5.dr
            Source: Binary string: D:\a\_work\1\s\obj\VS\Microsoft.WebTools.ProjectSystem.Components\Release\Microsoft.WebTools.ProjectSystem.Components.pdb source: is-3KHUI.tmp.5.dr
            Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: Setup.tmp, 00000002.00000003.1581237433.00000000022B1000.00000004.00001000.00020000.00000000.sdmp, Setup.exe, _isdecmp.dll.2.dr, _isdecmp.dll.5.dr
            Source: Binary string: D:\dbs\sh\ddvsm\0831_165144\cmd\1b\out\Intermediate\vc\microsoft.visualstudio.workspace.externalbuildframework.vs_x86retail_84B3C0EB\Release\net472\Microsoft.VisualStudio.Workspace.ExternalBuildFramework.VS.pdb source: is-9I2OC.tmp.5.dr
            Source: is-JOM36.tmp.5.drStatic PE information: 0xFD24D444 [Fri Aug 1 15:54:44 2104 UTC]
            Source: is-0RUKS.tmp.5.drStatic PE information: section name: PAGELK
            Source: is-IDBJG.tmp.5.drStatic PE information: section name: .00cfg
            Source: is-KU21U.tmp.5.drStatic PE information: section name: .nep
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeCode function: 6_3_0217F53A push cs; iretd 6_3_0217F551
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeCode function: 6_3_0217D972 push ds; retn 0000h6_3_0217D97C
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeCode function: 6_3_0217F08B pushfd ; iretd 6_3_0217F1C1
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeCode function: 6_3_0217D7AC push edx; retf 6_3_0217D7B1
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeCode function: 6_3_0217F7AA push esi; iretd 6_3_0217F791
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-1ABE0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-0RUKS.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\MpRtp.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_setup64.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\NuGet.PackageManagement.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_iscrypt.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\WzAddrycts64.dll (copy)Jump to dropped file
            Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-9I2OC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-6TF3I.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\sqlcese35.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_shfoldr.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.TeamFoundation.Deployment.Workflow.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-1BONH.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-MF6KC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.LanguageServices.TypeScript.resources.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-DNNFJ.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_iscrypt.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_isdecmp.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\ssh.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-J74UI.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_shfoldr.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.TeamFoundation.WorkItemTracking.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-JOM36.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-B6AOM.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-3KHUI.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.WebTools.ProjectSystem.Components.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\FxCopCommon.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\msys-pcre-1.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.Workspace.ExternalBuildFramework.VS.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-IDBJG.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-V00IP.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-KU21U.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_isdecmp.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpFile created: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\NuGet.Common.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_setup64.tmpJump to dropped file
            Source: C:\Users\user\Desktop\Setup.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Setup.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeWindow / User API: threadDelayed 4334Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-1ABE0.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-0RUKS.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\MpRtp.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_setup64.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\NuGet.PackageManagement.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_iscrypt.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\WzAddrycts64.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-9I2OC.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-6TF3I.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\sqlcese35.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_shfoldr.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.TeamFoundation.Deployment.Workflow.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-1BONH.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.LanguageServices.TypeScript.resources.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-DNNFJ.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_iscrypt.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_isdecmp.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\ssh.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_shfoldr.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-J74UI.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.TeamFoundation.WorkItemTracking.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-B6AOM.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-JOM36.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-3KHUI.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.WebTools.ProjectSystem.Components.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\msys-pcre-1.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\FxCopCommon.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.Workspace.ExternalBuildFramework.VS.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-IDBJG.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-V00IP.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-KU21U.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_isdecmp.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\NuGet.Common.dll (copy)Jump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_setup64.tmpJump to dropped file
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe TID: 5928Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe TID: 6660Thread sleep count: 4334 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeLast function: Thread delayed
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696501413o
            Source: Setup.tmp, 00000002.00000002.1598608810.0000000000748000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\)@
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696501413j
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
            Source: PilotEdit.exe, PilotEdit.exe, 00000006.00000003.2060952336.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2063574417.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2258047088.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2829061430.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2828871558.00000000020E4000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083162284.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2061313005.0000000002124000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696501413x
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
            Source: PilotEdit.exe, 00000006.00000003.2060952336.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2063574417.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2258047088.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2829061430.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083162284.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2061313005.0000000002124000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWeY?
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696501413t
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - HKVMware20,11696501413]
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696501413s
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008526732.0000000004F38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696501413p
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696501413t
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.comVMware20,11696501413
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696501413f
            Source: PilotEdit.exe, 00000006.00000003.2008753647.0000000004E52000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696501413
            Source: C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmpProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmpProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe" /VERYSILENTJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Setup.exe, 00000000.00000003.1599355911.00000000021EA000.00000004.00001000.00020000.00000000.sdmp, Setup.tmp, 00000002.00000003.1581237433.0000000002335000.00000004.00001000.00020000.00000000.sdmp, Setup.tmp, 00000002.00000003.1581237433.00000000022C0000.00000004.00001000.00020000.00000000.sdmp, Setup.exe, 00000003.00000003.1818126434.00000000022D1000.00000004.00001000.00020000.00000000.sdmp, Setup.tmp, 00000005.00000003.1813607044.0000000002AF3000.00000004.00001000.00020000.00000000.sdmp, Setup.tmp, 00000005.00000003.1814007903.000000000234C000.00000004.00001000.00020000.00000000.sdmp, Setup.tmp, 00000005.00000003.1814007903.00000000022D8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgui.exe
            Source: PilotEdit.exe, 00000006.00000003.2063405035.0000000004EA8000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083530809.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2257920687.000000000218A000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083162284.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2257689319.000000000217C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: PilotEdit.exe PID: 3068, type: MEMORYSTR
            Source: Yara matchFile source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: PilotEdit.exeString found in binary or memory: %appdata%\Electrum\wallets
            Source: PilotEdit.exeString found in binary or memory: Wallets/ElectronCash
            Source: PilotEdit.exeString found in binary or memory: Wallets/JAXX New Version
            Source: PilotEdit.exeString found in binary or memory: window-state.json
            Source: PilotEdit.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: PilotEdit.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: PilotEdit.exeString found in binary or memory: %appdata%\Ethereum
            Source: PilotEdit.exe, 00000006.00000003.2061313005.000000000210C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs.jsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
            Source: C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exeDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: PilotEdit.exe PID: 3068, type: MEMORYSTR
            Source: Yara matchFile source: 00000006.00000002.2829687578.0000000003F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
            Windows Management Instrumentation
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            221
            Security Software Discovery
            Remote Services41
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            21
            Virtualization/Sandbox Evasion
            LSASS Memory21
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
            Process Injection
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture115
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Timestomp
            LSA Secrets2
            System Owner/User Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials11
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync32
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1618058 Sample: Setup.exe Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 46 generalmills.pro 2->46 48 balancedzlife.tech 2->48 50 4 other IPs or domains 2->50 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 Antivirus detection for URL or domain 2->60 62 5 other signatures 2->62 10 Setup.exe 2 2->10         started        signatures3 process4 file5 36 C:\Users\user\AppData\Local\...\Setup.tmp, PE32 10->36 dropped 13 Setup.tmp 3 14 10->13         started        process6 file7 38 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 13->38 dropped 40 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->40 dropped 42 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 13->42 dropped 44 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->44 dropped 16 Setup.exe 2 13->16         started        process8 file9 26 C:\Users\user\AppData\Local\...\Setup.tmp, PE32 16->26 dropped 19 Setup.tmp 5 28 16->19         started        process10 file11 28 C:\Users\user\...\PilotEdit.exe (copy), PE32 19->28 dropped 30 C:\Users\user\AppData\...\ssh.dll (copy), PE32+ 19->30 dropped 32 C:\Users\user\...\sqlcese35.dll (copy), PE32+ 19->32 dropped 34 29 other files (none is malicious) 19->34 dropped 22 PilotEdit.exe 19->22         started        process12 dnsIp13 52 t.me 149.154.167.99, 443, 49711 TELEGRAMRU United Kingdom 22->52 54 stormlegue.com 104.21.64.1, 443, 49712, 49713 CLOUDFLARENETUS United States 22->54 64 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->64 66 Query firmware table information (likely to detect VMs) 22->66 68 Found many strings related to Crypto-Wallets (likely being stolen) 22->68 70 3 other signatures 22->70 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Setup.exe25%VirustotalBrowse
            Setup.exe38%ReversingLabsWin32.Spyware.Lummastealer
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_iscrypt.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_isdecmp.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_setup64.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_shfoldr.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp7%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp7%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_iscrypt.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_isdecmp.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_setup64.tmp0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\is-NLL60.tmp\_isetup\_shfoldr.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\FxCopCommon.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.TeamFoundation.Deployment.Workflow.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.LanguageServices.TypeScript.resources.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.TeamFoundation.WorkItemTracking.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.VisualStudio.Workspace.ExternalBuildFramework.VS.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\Microsoft.WebTools.ProjectSystem.Components.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\MpRtp.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\NuGet.Common.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\NuGet.PackageManagement.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\PilotEdit.exe (copy)8%ReversingLabsWin32.Trojan.Generic
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\WzAddrycts64.dll (copy)2%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-0RUKS.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-1ABE0.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-1BONH.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-3KHUI.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-6TF3I.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-9I2OC.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-B6AOM.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-DNNFJ.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-IDBJG.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-J74UI.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-JOM36.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-KU21U.tmp2%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-MF6KC.tmp8%ReversingLabsWin32.Trojan.Generic
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\is-V00IP.tmp0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\msys-pcre-1.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\sqlcese35.dll (copy)0%ReversingLabs
            C:\Users\user\AppData\Roaming\{73E5A364-F722-4251-A2AD-B613D6FDA6BD}\ssh.dll (copy)0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://stormlegue.com/apie100%Avira URL Cloudmalware
            https://stormlegue.com/apin100%Avira URL Cloudmalware
            http://www.gotdotnet.com/5PlatformAssembliesLocation0%Avira URL Cloudsafe
            https://stormlegue.com/apii100%Avira URL Cloudmalware
            http://www.cknotes.com/?p=910%Avira URL Cloudsafe
            https://stormlegue.com/apidu100%Avira URL Cloudmalware
            https://stormlegue.com/api100%Avira URL Cloudmalware
            http://www.pilotedit.com0%Avira URL Cloudsafe
            https://stormlegue.com/z100%Avira URL Cloudmalware
            https://stormlegue.com/apil100%Avira URL Cloudmalware
            http://www.chilkatsoft.com/p/p_463.asp)0%Avira URL Cloudsafe
            https://stormlegue.com/Gmcg100%Avira URL Cloudmalware
            https://stormlegue.com/ptOB100%Avira URL Cloudmalware
            https://balancedzlife.tech:443/api-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerno-cachePragm100%Avira URL Cloudmalware
            https://stormlegue.com/k100%Avira URL Cloudmalware
            https://balancedzlife.tech/A100%Avira URL Cloudmalware
            https://stormlegue.com/o100%Avira URL Cloudmalware
            https://stormlegue.com/l100%Avira URL Cloudmalware
            https://stormlegue.com/100%Avira URL Cloudmalware
            https://balancedzlife.tech/100%Avira URL Cloudmalware
            balancedzlife.tech100%Avira URL Cloudmalware
            https://stormlegue.com/;100%Avira URL Cloudmalware
            https://balancedzlife.tech/api100%Avira URL Cloudmalware
            https://mercharena.biz/100%Avira URL Cloudmalware
            http://www.cknotes.com/?p=411The0%Avira URL Cloudsafe
            https://stormlegue.com/apii1100%Avira URL Cloudmalware
            http://www.cknotes.com/?p=4110%Avira URL Cloudsafe
            http://www.cknotes.com/?p=2170%Avira URL Cloudsafe
            http://www.pilotedit.comopen0%Avira URL Cloudsafe
            http://www.cknotes.com/?p=2100%Avira URL Cloudsafe
            https://stormlegue.com/tI89100%Avira URL Cloudmalware
            https://login.microsoftonline.comXhttps://login.microsoftonline.com/extSTS.srf0%Avira URL Cloudsafe
            https://stormlegue.com/J/i13s6100%Avira URL Cloudmalware
            https://stormlegue.com/.100%Avira URL Cloudmalware
            http://www.pilotedit.comopen0-0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            stormlegue.com
            104.21.64.1
            truefalse
              high
              t.me
              149.154.167.99
              truefalse
                high
                balancedzlife.tech
                unknown
                unknowntrue
                  unknown
                  shiningrstars.help
                  unknown
                  unknownfalse
                    high
                    mercharena.biz
                    unknown
                    unknownfalse
                      high
                      generalmills.pro
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        blast-hubs.comfalse
                          high
                          https://t.me/prolksehr3false
                            high
                            https://stormlegue.com/apitrue
                            • Avira URL Cloud: malware
                            unknown
                            stormlegue.comfalse
                              high
                              shiningrstars.helpfalse
                                high
                                balancedzlife.techtrue
                                • Avira URL Cloud: malware
                                unknown
                                nestlecompany.profalse
                                  high
                                  mercharena.bizfalse
                                    high
                                    blastikcn.comfalse
                                      high
                                      generalmills.profalse
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://www.cloudflare.com/learning/access-management/phishing-attack/PilotEdit.exe, 00000006.00000003.1988233118.0000000002171000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/chrome_newtabPilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://stormlegue.com/zPilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://www.pilotedit.comis-MF6KC.tmp.5.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://duckduckgo.com/ac/?q=PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                high
                                                http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Setup.tmp, 00000005.00000002.1815864920.000000000019C000.00000004.00000010.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                  high
                                                  http://ocsp.sectigo.com0is-MF6KC.tmp.5.drfalse
                                                    high
                                                    http://www.winzip.com/authenticode.htm0is-KU21U.tmp.5.drfalse
                                                      high
                                                      https://web.telegram.orgPilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crt.sectigo.com/SectigoPublicCodeSigningRootR4Setup.tmp, 00000005.00000002.1815864920.000000000019C000.00000004.00000010.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSetup.exefalse
                                                            high
                                                            https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_PrPilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://stormlegue.com/apiduPilotEdit.exe, 00000006.00000003.2049154075.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA1000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://www.gotdotnet.com/5PlatformAssembliesLocationis-V00IP.tmp.5.drfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://stormlegue.com/apilPilotEdit.exe, 00000006.00000003.2258047088.0000000002124000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2258125852.0000000002138000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2829131661.0000000002139000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://stormlegue.com/apinPilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                  high
                                                                  http://www.cknotes.com/?p=91PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://stormlegue.com/apiePilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpgPilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://stormlegue.com/apiiPilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    http://aka.ms/witclientomis-1ABE0.tmp.5.drfalse
                                                                      high
                                                                      http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueTis-1BONH.tmp.5.drfalse
                                                                          high
                                                                          https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700PilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.chilkatsoft.com/p/p_463.asp)PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://x1.c.lencr.org/0PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://x1.i.lencr.org/0PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYiPilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2027446014.0000000004EA8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchPilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://stormlegue.com/GmcgPilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://stormlegue.com/ptOBPilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://balancedzlife.tech:443/api-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerno-cachePragmPilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://stormlegue.com/kPilotEdit.exe, 00000006.00000002.2830302217.0000000004E10000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://balancedzlife.tech/APilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://stormlegue.com/lPilotEdit.exe, 00000006.00000002.2830302217.0000000004E10000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdis-1BONH.tmp.5.drfalse
                                                                                      high
                                                                                      https://stormlegue.com/oPilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&ctaPilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://support.mozilla.org/products/firefoxgro.allPilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://balancedzlife.tech/PilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: malware
                                                                                          unknown
                                                                                          https://stormlegue.com/PilotEdit.exe, 00000006.00000002.2829000770.00000000020F6000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060879771.000000000217C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: malware
                                                                                          unknown
                                                                                          http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                                            high
                                                                                            http://www.innosetup.com/Setup.exe, Setup.tmp.0.dr, Setup.tmp.3.drfalse
                                                                                              high
                                                                                              https://stormlegue.com/;PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: malware
                                                                                              unknown
                                                                                              https://balancedzlife.tech/apiPilotEdit.exe, 00000006.00000003.1967579916.000000000212C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: malware
                                                                                              unknown
                                                                                              https://sectigo.com/CPS0PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                                                high
                                                                                                https://www.google.com/images/branding/product/ico/googleg_lodp.icoPilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://mercharena.biz/PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  https://github.com/NuGet/NuGet.Clientis-JOM36.tmp.5.dr, is-DNNFJ.tmp.5.drfalse
                                                                                                    high
                                                                                                    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#PilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                                                      high
                                                                                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://crl.rootca1.amazontrust.com/rootca1.crl0PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64PilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://ocsp.rootca1.amazontrust.com0:PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://www.cknotes.com/?p=411ThePilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                                                              • Avira URL Cloud: safe
                                                                                                              unknown
                                                                                                              https://www.ecosia.org/newtab/PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://www.symauth.com/cps0(is-KU21U.tmp.5.drfalse
                                                                                                                  high
                                                                                                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brPilotEdit.exe, 00000006.00000003.2027042746.000000000515D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    http://www.pilotedit.comopenPilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                                                                    • Avira URL Cloud: safe
                                                                                                                    unknown
                                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/Issueshttp://schemas.xmlsoap.org/ws/2005/05/identity/NoPis-1BONH.tmp.5.drfalse
                                                                                                                      high
                                                                                                                      https://www.cloudflare.com/5xx-error-landingPilotEdit.exe, 00000006.00000003.1988233118.0000000002171000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueTis-1BONH.tmp.5.drfalse
                                                                                                                          high
                                                                                                                          https://ac.ecosia.org/autocomplete?q=PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://www.cknotes.com/?p=217PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                                                                            • Avira URL Cloud: safe
                                                                                                                            unknown
                                                                                                                            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yPilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                                                                              high
                                                                                                                              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgPilotEdit.exe, 00000006.00000003.2049154075.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2060217504.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042378962.0000000004EA7000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2042768102.0000000004EA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                http://www.symauth.com/rpa00is-KU21U.tmp.5.drfalse
                                                                                                                                  high
                                                                                                                                  https://stormlegue.com/apii1PilotEdit.exe, 00000006.00000002.2829202421.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083530809.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2083162284.000000000217C000.00000004.00000020.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.2257689319.000000000217C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  • Avira URL Cloud: malware
                                                                                                                                  unknown
                                                                                                                                  http://www.cknotes.com/?p=411PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                  unknown
                                                                                                                                  http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zPilotEdit.exe, 00000006.00000003.1951413578.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000AA6B000.00000004.00000800.00020000.00000000.sdmp, Setup.exe, is-MF6KC.tmp.5.drfalse
                                                                                                                                    high
                                                                                                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?PilotEdit.exe, 00000006.00000003.2025702867.0000000004F3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://www.cknotes.com/?p=210PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                                                                                      • Avira URL Cloud: safe
                                                                                                                                      unknown
                                                                                                                                      https://stormlegue.com/tI89PilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      • Avira URL Cloud: malware
                                                                                                                                      unknown
                                                                                                                                      http://aka.ms/witclientomeis-1ABE0.tmp.5.drfalse
                                                                                                                                        high
                                                                                                                                        https://stormlegue.com/J/i13s6PilotEdit.exe, 00000006.00000003.2060217504.0000000004E26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                        • Avira URL Cloud: malware
                                                                                                                                        unknown
                                                                                                                                        http://www.remobjects.com/psSetup.exe, Setup.tmp.0.dr, Setup.tmp.3.drfalse
                                                                                                                                          high
                                                                                                                                          https://stormlegue.com/.PilotEdit.exe, 00000006.00000003.1988284600.000000000212B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          • Avira URL Cloud: malware
                                                                                                                                          unknown
                                                                                                                                          http://www.pilotedit.comopen0-PilotEdit.exe, 00000006.00000000.1810988608.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, PilotEdit.exe, 00000006.00000003.1951413578.000000000414F000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000002.2827148281.00000000008B4000.00000002.00000001.01000000.0000000E.sdmp, is-MF6KC.tmp.5.drfalse
                                                                                                                                          • Avira URL Cloud: safe
                                                                                                                                          unknown
                                                                                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=PilotEdit.exe, 00000006.00000003.1990294038.0000000004E5D000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990133672.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, PilotEdit.exe, 00000006.00000003.1990499108.0000000004E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://login.microsoftonline.comXhttps://login.microsoftonline.com/extSTS.srfis-1BONH.tmp.5.drfalse
                                                                                                                                            • Avira URL Cloud: safe
                                                                                                                                            unknown
                                                                                                                                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdis-1BONH.tmp.5.drfalse
                                                                                                                                              high
                                                                                                                                              • No. of IPs < 25%
                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                              • 75% < No. of IPs
                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                              104.21.64.1
                                                                                                                                              stormlegue.comUnited States
                                                                                                                                              13335CLOUDFLARENETUSfalse
                                                                                                                                              149.154.167.99
                                                                                                                                              t.meUnited Kingdom
                                                                                                                                              62041TELEGRAMRUfalse
                                                                                                                                              Joe Sandbox version:42.0.0 Malachite
                                                                                                                                              Analysis ID:1618058
                                                                                                                                              Start date and time:2025-02-18 15:37:50 +01:00
                                                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                                                              Overall analysis duration:0h 8m 29s
                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                              Report type:full
                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                              Number of analysed new started processes analysed:10
                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                              Technologies:
                                                                                                                                              • HCA enabled
                                                                                                                                              • EGA enabled
                                                                                                                                              • AMSI enabled
                                                                                                                                              Analysis Mode:default
                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                              Sample name:Setup.exe
                                                                                                                                              Detection:MAL
                                                                                                                                              Classification:mal100.troj.spyw.evad.winEXE@9/38@6/2
                                                                                                                                              EGA Information:Failed
                                                                                                                                              HCA Information:Failed
                                                                                                                                              Cookbook Comments:
                                                                                                                                              • Found application associated with file extension: .exe
                                                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                                                              • Excluded IPs from analysis (whitelisted): 4.245.163.56
                                                                                                                                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                                              • Execution Graph export aborted for target PilotEdit.exe, PID 3068 because there are no executed function
                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                              TimeTypeDescription
                                                                                                                                              09:40:13API Interceptor9x Sleep call for process: PilotEdit.exe modified
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                              104.21.64.1UPDATED SOA.pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.shlomi.app/t3l4/
                                                                                                                                              QUOTE OF DRY DOCK REPAIR.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.arryongro-nambe.live/ljgq/
                                                                                                                                              QUOTATION NO REQ-19-000640.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.askvtwv8.top/2875/
                                                                                                                                              Revised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.lucynoel6465.shop/hbfq/
                                                                                                                                              UPIlkrNpsh.exeGet hashmaliciousUnknownBrowse
                                                                                                                                              • xerecao.cc/
                                                                                                                                              engine.ps1Get hashmaliciousFormBookBrowse
                                                                                                                                              • www.askvtwv8.top/b8fe/
                                                                                                                                              laserrrrrrrr.ps1Get hashmaliciousFormBookBrowse
                                                                                                                                              • www.lucynoel6465.shop/jgkl/
                                                                                                                                              new quotation.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.shlomi.app/378r/
                                                                                                                                              PO 87877889X,pdf.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.lucynoel6465.shop/jgkl/
                                                                                                                                              r53YFSyurTyIZZMd.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • www.lucynoel6465.shop/u7tz/
                                                                                                                                              149.154.167.99http://45.142.208.144.sslip.io/blog/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/img/emoji/40/F09F9889.png
                                                                                                                                              http://xn--r1a.website/s/ogorodruGet hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/img/favicon.ico
                                                                                                                                              http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/
                                                                                                                                              http://cache.netflix.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/dl?tme=fe3233c08ff79d4814_5062105595184761217
                                                                                                                                              http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/
                                                                                                                                              http://bekaaviator.kz/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/
                                                                                                                                              http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/?setln=pl
                                                                                                                                              http://makkko.kz/Get hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.org/
                                                                                                                                              http://telegram.dogGet hashmaliciousUnknownBrowse
                                                                                                                                              • telegram.dog/
                                                                                                                                              LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                                                                                                                                              • t.me/cinoshibot
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                              t.mehttps://telegramcom.kv252.top/Get hashmaliciousTelegram PhisherBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              keynote.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              updater.exeGet hashmaliciousVidarBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              lnst#U0430Il#U0435r86x.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              lum.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              mma.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              http://www.velineue.com/Get hashmaliciousUnknownBrowse
                                                                                                                                              • 149.154.167.99
                                                                                                                                              stormlegue.com#Ud835#Udde6#Ud835#Uddf2#Ud835#Ude01#Ud835#Ude02#Ud835#Uddfd.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.32.1
                                                                                                                                              0805#U007e1.EXE.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.16.1
                                                                                                                                              setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.16.1
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                              TELEGRAMRU046s01900330081250b4057885818022025.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              Polylogy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              Purchase Order_2025.GZGet hashmaliciousDBatLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              Vejning.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              173986194367d5b010c726a273e684c444fad68035ad95510fd3cc50d0c4ea18ad11b83de8491.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              1739861824b75a9f8eefb234627424d8006aa29332666d4728e6ec2e69d198fc6fbcbc6425122.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              jjmax il.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeGet hashmaliciousDBatLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              nDHL_CUSTOM_CLEARANCE_FORM_3409249_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              DHL AWB Document_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                              • 149.154.167.220
                                                                                                                                              CLOUDFLARENETUSSFT20020117.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • 172.67.223.218
                                                                                                                                              AWB_5771388044 Versanddokumente.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              046s01900330081250b4057885818022025.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                              • 104.21.112.1
                                                                                                                                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 188.114.97.3
                                                                                                                                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 172.67.75.40
                                                                                                                                              eid.exeGet hashmaliciousUnknownBrowse
                                                                                                                                              • 162.159.138.232
                                                                                                                                              QUOTATION REQUEST.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • 188.114.97.3
                                                                                                                                              Drawing.bat.exeGet hashmaliciousFormBookBrowse
                                                                                                                                              • 188.114.96.3
                                                                                                                                              https://webopeansea-app.shop/web3/Get hashmaliciousUnknownBrowse
                                                                                                                                              • 104.17.25.14
                                                                                                                                              #Ud835#Udde6#Ud835#Uddf2#Ud835#Ude01#Ud835#Ude02#Ud835#Uddfd.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 172.67.75.40
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                              a0e9f5d64349fb13191bc781f81f42e1Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              #Ud835#Udde6#Ud835#Uddf2#Ud835#Ude01#Ud835#Ude02#Ud835#Uddfd.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              0805#U007e1.EXE.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              E3B8#U007e1.EXE.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              xOLFehjWNU.docGet hashmaliciousUnknownBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              E3B8#U007e1.EXE.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              po-56-ns 056374TI.docx.docGet hashmaliciousUnknownBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                              • 104.21.64.1
                                                                                                                                              • 149.154.167.99
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                              C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_isdecmp.dllwEY98gM1Jj.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                                                                                gLkRoYHytv.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                  Contract for Partners.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                    JV4lf0wkWV.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                      BN.exeGet hashmaliciousQuasarBrowse
                                                                                                                                                        Exploit Locator.exeGet hashmaliciousPureCrypterBrowse
                                                                                                                                                          Exploit Locator.exeGet hashmaliciousPureCrypterBrowse
                                                                                                                                                            FAIRSAFE_setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                              Mansion_setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                SecuriteInfo.com.Win64.Evo-gen.20212.7823.exeGet hashmaliciousXmrigBrowse
                                                                                                                                                                  C:\Users\user\AppData\Local\Temp\is-16N32.tmp\_isetup\_iscrypt.dllwEY98gM1Jj.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                                                                                                    gLkRoYHytv.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                      Exploit Locator.exeGet hashmaliciousPureCrypterBrowse
                                                                                                                                                                        Exploit Locator.exeGet hashmaliciousPureCrypterBrowse
                                                                                                                                                                          FAIRSAFE_setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            Mansion_setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                              1w5RpHuliE.exeGet hashmaliciousAmadey, GCleaner, LummaC Stealer, PureLog Stealer, RedLine, SmokeLoader, VidarBrowse
                                                                                                                                                                                random.exeGet hashmaliciousGCleaner, LummaC Stealer, Socks5SystemzBrowse
                                                                                                                                                                                  mix.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                                                                                    mix.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):2560
                                                                                                                                                                                      Entropy (8bit):2.8818118453929262
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                                                                                                      MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                                                                                                      SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                                                                                                      SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                                                                                                      SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Joe Sandbox View:
                                                                                                                                                                                      • Filename: wEY98gM1Jj.ps1, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: gLkRoYHytv.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Exploit Locator.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Exploit Locator.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: FAIRSAFE_setup.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Mansion_setup.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: 1w5RpHuliE.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: random.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: mix.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: mix.exe, Detection: malicious, Browse
                                                                                                                                                                                      Reputation:high, very likely benign file
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):13312
                                                                                                                                                                                      Entropy (8bit):5.745960477552938
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                                                                                                                                                      MD5:A813D18268AFFD4763DDE940246DC7E5
                                                                                                                                                                                      SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                                                                                                                                                      SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                                                                                                                                                      SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Joe Sandbox View:
                                                                                                                                                                                      • Filename: wEY98gM1Jj.ps1, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: gLkRoYHytv.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Contract for Partners.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: JV4lf0wkWV.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: BN.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Exploit Locator.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Exploit Locator.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: FAIRSAFE_setup.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: Mansion_setup.exe, Detection: malicious, Browse
                                                                                                                                                                                      • Filename: SecuriteInfo.com.Win64.Evo-gen.20212.7823.exe, Detection: malicious, Browse
                                                                                                                                                                                      Reputation:high, very likely benign file
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):6144
                                                                                                                                                                                      Entropy (8bit):4.720366600008286
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                                                                                                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                                                                                                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                                                                                                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                                                                                                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Reputation:high, very likely benign file
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):23312
                                                                                                                                                                                      Entropy (8bit):4.596242908851566
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                                                                                                                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                                                                                                                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                                                                                                                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                                                                                                                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):1177088
                                                                                                                                                                                      Entropy (8bit):6.399664882447376
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:24576:nKbqslNoiGO+h84C6f8HSCNFfoJMbNOED5TOzuRdTxyt:KwY6fUVNvN1j
                                                                                                                                                                                      MD5:B1F9D665E52C29972B50D7145D88DCE1
                                                                                                                                                                                      SHA1:DF2C67A5C32A19BB110EC8372134522C0DAB9AC2
                                                                                                                                                                                      SHA-256:2FFABB0018D335267D2D0101A41CAC7AC7D1AA80956FAE91825E46AAA85C0787
                                                                                                                                                                                      SHA-512:BCDCE189402FFC1C17B9803AC4040BD1CB23E32BA2C1476CBCFAE13438078E01F78AD3F76E1BF71A6EC204663AA5F5780990016FC074218763D63DB1431F1E75
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 7%
                                                                                                                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....-.V..........................................@.......................................@......@..............................@8... ...............................................................................................................text............................... ..`.itext.. ........................... ..`.data...h0.......2..................@....bss.....a...P.......&...................idata..@8.......:...&..............@....tls....<............`...................rdata...............`..............@..@.rsrc........ .......b..............@..@....................................@..@........................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\Desktop\Setup.exe
                                                                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):1177088
                                                                                                                                                                                      Entropy (8bit):6.399664882447376
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:24576:nKbqslNoiGO+h84C6f8HSCNFfoJMbNOED5TOzuRdTxyt:KwY6fUVNvN1j
                                                                                                                                                                                      MD5:B1F9D665E52C29972B50D7145D88DCE1
                                                                                                                                                                                      SHA1:DF2C67A5C32A19BB110EC8372134522C0DAB9AC2
                                                                                                                                                                                      SHA-256:2FFABB0018D335267D2D0101A41CAC7AC7D1AA80956FAE91825E46AAA85C0787
                                                                                                                                                                                      SHA-512:BCDCE189402FFC1C17B9803AC4040BD1CB23E32BA2C1476CBCFAE13438078E01F78AD3F76E1BF71A6EC204663AA5F5780990016FC074218763D63DB1431F1E75
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 7%
                                                                                                                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....-.V..........................................@.......................................@......@..............................@8... ...............................................................................................................text............................... ..`.itext.. ........................... ..`.data...h0.......2..................@....bss.....a...P.......&...................idata..@8.......:...&..............@....tls....<............`...................rdata...............`..............@..@.rsrc........ .......b..............@..@....................................@..@........................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):2560
                                                                                                                                                                                      Entropy (8bit):2.8818118453929262
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                                                                                                      MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                                                                                                      SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                                                                                                      SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                                                                                                      SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):13312
                                                                                                                                                                                      Entropy (8bit):5.745960477552938
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                                                                                                                                                      MD5:A813D18268AFFD4763DDE940246DC7E5
                                                                                                                                                                                      SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                                                                                                                                                      SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                                                                                                                                                      SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):6144
                                                                                                                                                                                      Entropy (8bit):4.720366600008286
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                                                                                                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                                                                                                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                                                                                                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                                                                                                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-6R8MJ.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):23312
                                                                                                                                                                                      Entropy (8bit):4.596242908851566
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                                                                                                                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                                                                                                                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                                                                                                                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                                                                                                                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):226336
                                                                                                                                                                                      Entropy (8bit):6.114695385867635
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:3072:HEMxytuS0TaR7mTMVnEVJogf3P7l8loLYWifiAm/I8T4J5f6T5MSZt:HEMgsagtXogbvifiuEL
                                                                                                                                                                                      MD5:28561C10FDBB4520252965B78FC9D286
                                                                                                                                                                                      SHA1:DBE6C981A40568F6B38FF25AEDC3EE39CC6CEB86
                                                                                                                                                                                      SHA-256:0388F2EE8D7BF1FBBF4C1CF3887A629BD28428FA28D8DA94C2C3DD5E765A85AA
                                                                                                                                                                                      SHA-512:CB42C44834D3177745B46EA3EB7E6CC149EEAF7482B792AB2ED703271D8CEF66C2F7DA2432516EABF1F20D3FD50A585026AEFE65783AC79E2CF37A3C9B2E5918
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...3t............" ..0..B...........a... ........... ....................................@.................................wa..O....................L.. (...........`..8............................................ ............... ..H............text....A... ...B.................. ..`.rsrc................D..............@..@.reloc...............J..............@..B.................a......H.......l,...}..............8...,`........................................(......(......(......(.......(....*.~....-.(Q...r...p(....(.........~....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(....o.....0..(....o.....0..(....o.......*.*..{....*"..}....*...0..G.......s......r3..p( ......+......(........,....o!.....X....i2...&..&...s"...*.........4:..........4=.......0..C.......s#...%.o$.....s%...%.o&...('......o(......,..o).....(.......&...*.*....... ..)..........<<..
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):299928
                                                                                                                                                                                      Entropy (8bit):6.077141173950081
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:3072:VA/8IQ7Ne3s0Uz4PMOEYDU13IEKH0PShPtGSFGSO7eSEWEZp5L029FFLXJ1Cp6up:+BTPM0a3IE+zXWEZntFf1CAu2qv
                                                                                                                                                                                      MD5:50A577AA14A3C48933CBB26E40D7F19F
                                                                                                                                                                                      SHA1:187F5C1E9B152B42B502BDDB66BFF89838239CAA
                                                                                                                                                                                      SHA-256:EAD9B414C37BCF56B309D1EB52393B43645A5448CF36B28F2F4DEDF033A54B32
                                                                                                                                                                                      SHA-512:084B69AAA14070B826744C49D07A3458EFD55D411D342049DA74656E601F7ECA1965249A2A6DBD94144B09C02D003418063FB6B85E6851AEF18B27F0C54A0732
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.........." ..0..b............... ........... ...............................{....`.................................0...O.......@............l...'...........~............................................... ............... ..H............text....`... ...b.................. ..`.rsrc...@............d..............@..@.reloc...............j..............@..B................d.......H.......p....................i...}........................................{)...*..{*...*V.(+.....}).....}*...*...0..;........u#.....,/(,....{)....{)...o-...,.(.....{*....{*...o/...*.*. .... )UU.Z(,....{)...o0...X )UU.Z(.....{*...o1...X*.0...........r...p......%..{)..........&.....&...-.q&........&...-.&.+...&...o2....%..{*..........'.....'...-.q'........'...-.&.+...'...o2....(3...*..{....*"..}....*..{....*"..}....*...0..#........(.....o4.....(.....o5.......(....*..(6...*..{..
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):279072
                                                                                                                                                                                      Entropy (8bit):5.4107383950420935
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:3072:ri18tZ1iUskbPPzvlNZibMYFsIs6zEoOLtJDLimdOmaLC/+ShMY+pjYl7ho/cGxx:ry5M9PITV+x8e4pYmsq
                                                                                                                                                                                      MD5:337931D5DD5CDCEE396E4880C6256429
                                                                                                                                                                                      SHA1:0C15647CA50A9556AC3B06B5FF2552AACE00877D
                                                                                                                                                                                      SHA-256:E5E076E14182227C6D853735B77D1E92CF81BD3B91009B3B788AF94FAD158456
                                                                                                                                                                                      SHA-512:D51B70E01F6698C2113DA683CF68D2CB32F8835597E8DC236A5AE0708292B1A956BF36D435772612F5CCC98B980C7BA2AD8FF5B2865F3A9DECA912002FFB10AF
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....a.d...........!................./... ...@....@.. ....................................@.................................X/..S....@.................. (...`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................./......H.......P+..............P ..~....*......................................4..............lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP6.....y)..O.y.......S...T]..\......{....hu.3.`.+-........%f......-.e.Joh.8.C'...'.,.; ..H...X...^.._G.._........w...............=...................$...........].......................R...I...........,...............
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):806944
                                                                                                                                                                                      Entropy (8bit):6.299013113627838
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:12288:w09DLOGmmYXDaQIEx/sf7gXXUtVjPnK+WpZU9:P9DqBmADa4g7gXXUtVjPndqE
                                                                                                                                                                                      MD5:36ADA725660FA70707BD1AF2CFC58CCF
                                                                                                                                                                                      SHA1:BB4CD91BD788819D0EF3FFEEF418685234A0D535
                                                                                                                                                                                      SHA-256:E407025F9CDAC08F0A70A62920B05EEADCAE7F05DE9B3EDF17ED7D72D21E4734
                                                                                                                                                                                      SHA-512:48070B689EAAACFE53C062E71149E457106BCE9D04D01C1C5380368DC0B28BC493F7737E772AAFCA0B729B8C3C87C2EB1BAE8D4B62479B73482266F1CD679731
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..0..R...........p... ........... ..............................{i....`..................................p..O....................(.. (...`......Po............................................... ............... ..H............text....P... ...R.................. ..`.rsrc................T..............@..@.reloc.......`.......&..............@..B.................p......H........G..<...............8{..Pn........................................(f...*^.(f......%...%...}....*:.(f.....}....*:.(f.....}....*>. 4......(g...*2......oh...*:........oi...*...0..,........oj...r...p $...........%...%....ok...t#...*&...ol...*..(m...*..(n...*"..(o...*&...(p...*&...(q...*..(....*"..(....*&...(....*&...(....*..(....*6..(....(....*&...(....*6..(?...(....*6..(@...(....*2.(....(....*"..(....*6..(....(....*...-..(%...+...).....)....($...(......(&.....((.....(*..
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):290744
                                                                                                                                                                                      Entropy (8bit):6.7143339864270875
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:3072:Z+JLUq/Sn85OCBWWhLXCcA1oL4WVTZJVdsemRAKtNRsfLkTTd5lu9Z+xm1u+Y2Qw:XkL74sZmntnsgfd58oYu+Y/4aItNd9
                                                                                                                                                                                      MD5:7FD3D2E87F5DAE4BB5412F493773B6BB
                                                                                                                                                                                      SHA1:F843D77724A727701FFFBFD3E441CB1149747705
                                                                                                                                                                                      SHA-256:8F2A11E195C69438432DAA60C6703AD3B23818FF84241451E228C9E801C87C8A
                                                                                                                                                                                      SHA-512:9A7989D99F541DEB45C78EFF185507E7766A1C644F27CEB22E21742B650DFBE08FC2F6F2EB457BBF501EE27B8DFDF541082A9943D8EAF71103765EA68462BF50
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..>..........B\... ...`....... ..............................*.....`..................................[..O....`...............H...'...........Z..8............................................ ............... ..H............text...H<... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............F..............@..B................#\......H.......,...............D....n...Y........................................{9...*..{:...*V.(;.....}9.....}:...*...0..A........u........4.,/(<....{9....{9...o=...,.(>....{:....{:...o?...*.*.*. d..| )UU.Z(<....{9...o@...X )UU.Z(>....{:...oA...X*...0..b........r...p......%..{9......%q.........-.&.+.......oB....%..{:......%q.........-.&.+.......oB....(C...*..(D...*^.(D......#...%...}....*:.(D.....}....*:.(D.....}....*V!..W.}....sE........*..(D...*..(D...*..(D...*..{....*:.(D.....}
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):881600
                                                                                                                                                                                      Entropy (8bit):6.146223181724618
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:12288:lXb54bkF5rlIk+1cdvk06bXgg4uAwhqHQANBCKysU/YcwLLaH0qtDmg:55E+rlIk+1rjYuFqHQANB3ysU/YVn+yg
                                                                                                                                                                                      MD5:6F256C55D4DA2FF9B109C347FED079CA
                                                                                                                                                                                      SHA1:33DC56728CC21FCBF923FEC8BD75951801EF03CE
                                                                                                                                                                                      SHA-256:A9FDCAEC1DF35A6D4395E593FBFD06B5C8E48F85BEA801ED4EBAC06A0C57780B
                                                                                                                                                                                      SHA-512:1DC70CB5F64E3E229723502E6A3FBE4AAFEE8F92691D4C1B76A3FB8CC250F71E16211A6C41A2848B6E4A8FBD9B684367DA5E39B5A09E4132010140F1C9A478F5
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0..B...........a... ........... ....................................`.................................2a..O.......,............L...'..........h`..8............................................ ............... ..H............text....A... ...B.................. ..`.rsrc...,............D..............@..@.reloc...............J..............@..B................fa......H.......$...lV..............Xl..._........................................(;...*^.(;..........%...}....*:.(;.....}....*:.(;.....}....*:.(;.....}....*V!...]N....s<........*V..}......}.....(=...*......(>...*..{....*"..}....*..{....*"..}....*..0..@.......s?.....r...po@...&.rA..po@...&..o....,... oA...&..}oA...&.oB...*.(C....rI..po@...&..(....oD...&.ri..po@...&..(....oD...&.*...(.......*N.....,...o....*.*.*.(E....o....oF... )UU.Z(G....{....oH...X )UU.Z(G....{....oH...X*6..u....o.
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):657960
                                                                                                                                                                                      Entropy (8bit):6.2254541113614374
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:12288:lzw+ohkB0AUxnilYsWGet93hIsm+qtNcucLTv0f4i8kC:l8qSA0niaDdc+oNpcLTMf4i8f
                                                                                                                                                                                      MD5:C0ABE68ADC949767A8FCB7F6E412A10A
                                                                                                                                                                                      SHA1:7203B04805BED5D62D60AE44F84D2F61BD1974D4
                                                                                                                                                                                      SHA-256:18B1B282A4F6BD403E66586F9CE003C06A5469A9F973FB3382829CAE305040A5
                                                                                                                                                                                      SHA-512:6F5817E59953355A1BB018AF5EA0E57920EE67E8FF7516D04B8513A60EDB6FE6BC5ED1AE082AD19A2F76C2C6DACD345C33B7B801B788B84F7BAB8A33924710D1
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Fk.5...f...f...fgl.g...f...fg..fgl.g...fgl.g...fgl.g<..fgl.g...fgl.gx..fgl.f...fgl.g...fRich...f........PE..d...6............." ................0..........^............................. ......E.....`A............................................................@........_......(<......P...p...T.......................(... ............... ...........@....................text...k........................... ..`.rdata...>.......@..................@..@.data...(C...0...4..................@....pdata..._.......`...L..............@..@.didat..0...........................@....rsrc...@...........................@..@.reloc..P...........................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):280752
                                                                                                                                                                                      Entropy (8bit):6.509569076102415
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:6144:JQDkWF90bW+bZwxc5gPmuNtNOTeHx8FkZIYCZq:0z0bW+6INqHx600q
                                                                                                                                                                                      MD5:A9050F36854A9E7A60F30575081701F5
                                                                                                                                                                                      SHA1:9518ED6B24A899A97B24358D8737A3F9DA15277E
                                                                                                                                                                                      SHA-256:8B1068DC39A17F8D8E6D4CAF62BBB04B1F2241F08BFE88D0B34DE7B09321E8BB
                                                                                                                                                                                      SHA-512:7C273CB2129A474698F7004A00DBCD9F34DF5769EA59BF521122DA5CDDDE7810C08FE6738EDE65E552EEE58B339E07D26690F21778A702904D1D88B808A28C97
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...D.$..........." ......................................................... ......H9....`...@......@............... ......................................pl..t"... ...(..........0#..T...............................................................H............text...Q........................... ..`.data...Lj.......p..................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):453016
                                                                                                                                                                                      Entropy (8bit):6.0389539045831535
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:6144:OTep0mSXsppzo+P1WYAN5sRNvMjjcH5qDnnFGPNGDGl2IBVwFjMI0ktlICEYJfup:MXsPhNW7HsRNZZ4FcQ04ICy
                                                                                                                                                                                      MD5:F67A396E88B92B0A35E307613937DE35
                                                                                                                                                                                      SHA1:73B059CABC14403F571B7552BE459FEB3D40746B
                                                                                                                                                                                      SHA-256:3586FEE191679DE68C8B02299BC156DA01021C1EDC8DE2C4EE8B703853FDFEE8
                                                                                                                                                                                      SHA-512:30E2954F80456A380FD985E56EF1EA450BEA0B1DEB3C11E88ECD61E02081729250D699210AD396911F37C570E1D5D7A2EBF43C540AFE18CABB2D3EE1B4C3D542
                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1............" ..0..r...N.......... ........... ....................... ............`.....................................O........J...............'.............8............................................ ............... ..H............text....p... ...r.................. ..`.rsrc....J.......L...t..............@..@.reloc..............................@..B.......................H.......@~..............$^..@1..d.........................................{3...*..{4...*V.(5.....}3.....}4...*...0..A........u........4.,/(6....{3....{3...o7...,.(8....{4....{4...o9...*.*.*. ZX.. )UU.Z(6....{3...o:...X )UU.Z(8....{4...o;...X*...0..b........r...p......%..{3......%q.........-.&.+.......o<....%..{4......%q.........-.&.+.......o<....(=...*..{>...*..{?...*V.(5.....}>.....}?...*.0..A........u........4.,/(6....{>....{>...o7...,.(8....{?....{?...o9...*.*.*. ..:. )UU.
                                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-DR2HE.tmp\Setup.tmp
                                                                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                      Size (bytes):110228532
                                                                                                                                                                                      Entropy (8bit):1.531750627424518
                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                      SSDEEP:
                                                                                                                                                                                      MD5:0D9B524228544CB2C010A34B20C1D31F
                                                                                                                                                                                      SHA1:50D4FCA523B3CCA0CEA4EAA4F7EAB6B906AEEA7A
                                                                                                                                                                                      SHA-256:202806A5AD89FBC94B6E46CBA5B4DC3741D428E0F1D9ACC99D7A74EB067B9263
                                                                                                                                                                                      SHA-512:ABF460A645CF6AE6DDEFA4DF64144A870BEA3664A6F830DA1BE4D3FBB1C626542BBC74CB064BCA876E708A5E9BB49C12EAF65961CFBE26C75D3EEFD8FEDF2E2F
                                                                                                                                                                                      Malicious:true
                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................................9|..-$....-2.v...-5..|..-;./...-%....- ....Rich....................PE..L......g................."K..>.......-.......@K...@..........................@.......X......................................4.d......0$............................`SK...............................^.@............@K.(....-d.@....................text....!K......"K................. ..`.rdata.......@K..0...&K.............@..@.data.......pd......Vd.............@....rsrc........0$......`f.............@..@................................................................................................................................................................................................................................................................................................................................................................