Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1631926
MD5:e4265c65f6f798bdc3f1644caaa09379
SHA1:5c72cd53fb3091b5cdb44021a05abd4cb116ef32
SHA256:a5847cf2d171622e07ec1cb81015033c57f60e7bf3e3f808a5dbdcb44ffe4498
Tags:exeSocks5Systemzuser-jstrosch
Infos:

Detection

Socks5Systemz
Score:88
Range:0 - 100
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Yara detected Socks5Systemz
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Joe Sandbox ML detected suspicious sample
PE file has a writeable .text section
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6976 cmdline: "C:\Users\user\Desktop\file.exe" MD5: E4265C65F6F798BDC3F1644CAAA09379)
    • file.tmp (PID: 6992 cmdline: "C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmp" /SL5="$203AA,4337550,56832,C:\Users\user\Desktop\file.exe" MD5: 01EB6207431C47E642C878967668AC73)
      • photorecoverylib.exe (PID: 7040 cmdline: "C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe" -i MD5: 84FDC770D4A9ECD786E59A0C9F7F9C26)
  • svchost.exe (PID: 6332 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6760 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 6708 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 1156 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • sppsvc.exe (PID: 2648 cmdline: C:\Windows\system32\sppsvc.exe MD5: 320823F03672CEB82CC3A169989ABD12)
  • svchost.exe (PID: 3184 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 4724 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 6740 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 1444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2733155463.0000000000B51000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2733849718.0000000002E4B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: photorecoverylib.exe PID: 7040JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 616, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6332, ProcessName: svchost.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-03-07T17:35:13.162008+010020287653Unknown Traffic192.168.2.949690176.113.115.96443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-03-07T17:35:13.918490+010028032742Potentially Bad Traffic192.168.2.949690176.113.115.96443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: file.exeVirustotal: Detection: 18%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045D230 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D230
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045D2E4 ArcFourCrypt,1_2_0045D2E4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045D2FC ArcFourCrypt,1_2_0045D2FC
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeUnpacked PE file: 2.2.photorecoverylib.exe.400000.0.unpack
        Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Photo Recovery Library_is1Jump to behavior
        Source: unknownHTTPS traffic detected: 176.113.115.96:443 -> 192.168.2.9:49690 version: TLS 1.2
        Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: msvcp100.i386.pdb source: is-V0I3T.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00475798 FindFirstFileA,FindNextFileA,FindClose,1_2_00475798
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0046417C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0046417C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004645F8 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004645F8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00462BF0 FindFirstFileA,FindNextFileA,FindClose,1_2_00462BF0
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00498FDC FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00498FDC
        Source: Joe Sandbox ViewIP Address: 176.113.115.96 176.113.115.96
        Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.9:49690 -> 176.113.115.96:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49690 -> 176.113.115.96:443
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd85241ab258d84629326be8ea43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd7d4915f4cc1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B52B95 WSASetLastError,WSARecv,WSASetLastError,select,2_2_00B52B95
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd85241ab258d84629326be8ea43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd7d4915f4cc1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 176.113.115.96
        Source: file.tmp, 00000001.00000002.2733554548.00000000060F3000.00000004.00001000.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000000.892056485.0000000000889000.00000002.00000001.01000000.00000009.sdmp, is-GSQB7.tmp.1.dr, PhotoRecoveryLib.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
        Source: file.tmp, 00000001.00000002.2733554548.00000000060F3000.00000004.00001000.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000000.892056485.0000000000889000.00000002.00000001.01000000.00000009.sdmp, is-GSQB7.tmp.1.dr, PhotoRecoveryLib.exe.2.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
        Source: file.tmp, 00000001.00000002.2733554548.00000000060F3000.00000004.00001000.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000000.892056485.0000000000889000.00000002.00000001.01000000.00000009.sdmp, is-GSQB7.tmp.1.dr, PhotoRecoveryLib.exe.2.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
        Source: qmgr.db.3.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
        Source: qmgr.db.3.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
        Source: qmgr.db.3.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
        Source: qmgr.db.3.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
        Source: qmgr.db.3.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
        Source: qmgr.db.3.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
        Source: edb.log.3.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
        Source: is-140KI.tmp.1.dr, is-ED1JI.tmp.1.drString found in binary or memory: http://icu-project.org
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: http://nanoways.com/check/%hs
        Source: file.tmp, 00000001.00000002.2733554548.00000000060F3000.00000004.00001000.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000000.892056485.0000000000889000.00000002.00000001.01000000.00000009.sdmp, is-GSQB7.tmp.1.dr, PhotoRecoveryLib.exe.2.drString found in binary or memory: http://ocsp.digicert.com0H
        Source: svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
        Source: file.tmp, file.tmp, 00000001.00000002.2732189124.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: file.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
        Source: file.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: file.exe, 00000000.00000003.876435661.0000000002330000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.876600889.00000000020C8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000002.2732189124.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
        Source: file.exe, 00000000.00000003.876435661.0000000002330000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.876600889.00000000020C8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.2732189124.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
        Source: photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B15000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/
        Source: photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/L
        Source: photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd85241
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
        Source: svchost.exe, 00000004.00000002.1369629824.000001D5CAE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
        Source: svchost.exe, 00000004.00000003.1369036849.000001D5CAE5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369101779.000001D5CAE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369691577.000001D5CAE81000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
        Source: svchost.exe, 00000004.00000002.1369691577.000001D5CAE81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
        Source: svchost.exe, 00000004.00000002.1369667719.000001D5CAE68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
        Source: svchost.exe, 00000004.00000002.1369704181.000001D5CAE88000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368901090.000001D5CAE86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
        Source: svchost.exe, 00000004.00000003.1369101779.000001D5CAE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369592263.000001D5CAE3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
        Source: svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368987440.000001D5CAE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369667719.000001D5CAE68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
        Source: svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369592263.000001D5CAE3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
        Source: svchost.exe, 00000004.00000002.1369605520.000001D5CAE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
        Source: svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
        Source: svchost.exe, 00000004.00000003.1369112838.000001D5CAE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1369036849.000001D5CAE5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369605520.000001D5CAE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
        Source: svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368987440.000001D5CAE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369667719.000001D5CAE68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
        Source: edb.log.3.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
        Source: svchost.exe, 00000003.00000003.1207075388.000001F6D8E60000.00000004.00000800.00020000.00000000.sdmp, edb.log.3.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: https://nanoways.com/activate
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: https://nanoways.com/activate/?prefill=%hs
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: https://nanoways.com/deactivate
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: https://nanoways.com/deactivate/?prefill=%hs
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: https://nanoways.com/qr/%1
        Source: svchost.exe, 00000004.00000003.1369153560.000001D5CAE31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dyn
        Source: svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
        Source: svchost.exe, 00000004.00000003.1369153560.000001D5CAE31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs
        Source: svchost.exe, 00000004.00000003.1369112838.000001D5CAE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1369112838.000001D5CAE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369629824.000001D5CAE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1369057942.000001D5CAE5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
        Source: svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
        Source: svchost.exe, 00000004.00000003.1369153560.000001D5CAE31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.vpC
        Source: svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
        Source: svchost.exe, 00000004.00000002.1369629824.000001D5CAE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
        Source: file.tmp, 00000001.00000002.2733554548.00000000060F3000.00000004.00001000.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000000.892056485.0000000000889000.00000002.00000001.01000000.00000009.sdmp, is-GSQB7.tmp.1.dr, PhotoRecoveryLib.exe.2.drString found in binary or memory: https://www.digicert.com/CPS0
        Source: file.exe, 00000000.00000002.2732565926.00000000020C1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.875695832.00000000020C1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.875588106.0000000002330000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.877978618.0000000002378000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.2732626716.0000000000654000.00000004.00000020.00020000.00000000.sdmp, file.tmp, 00000001.00000002.2733349175.0000000002378000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.877877861.0000000003250000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
        Source: PhotoRecoveryLib.exe.2.drString found in binary or memory: https://www.openssl.org/docs/faq.html
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
        Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
        Source: unknownHTTPS traffic detected: 176.113.115.96:443 -> 192.168.2.9:49690 version: TLS 1.2

        System Summary

        barindex
        Source: photorecoverylib.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: PhotoRecoveryLib.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0042F594 NtdllDefWindowProc_A,1_2_0042F594
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00479380 NtdllDefWindowProc_A,1_2_00479380
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045763C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045763C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00470C741_2_00470C74
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0043533C1_2_0043533C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004813C41_2_004813C4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004678481_2_00467848
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004303D01_2_004303D0
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0044453C1_2_0044453C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004885E01_2_004885E0
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004346381_2_00434638
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00444AE41_2_00444AE4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0048ED0C1_2_0048ED0C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00430F5C1_2_00430F5C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045F16C1_2_0045F16C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004451DC1_2_004451DC
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045B21C1_2_0045B21C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004455E81_2_004455E8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004876801_2_00487680
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0046989C1_2_0046989C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00451A301_2_00451A30
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0043DDC41_2_0043DDC4
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_004010002_2_00401000
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_004067B72_2_004067B7
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609660FA2_2_609660FA
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6092114F2_2_6092114F
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6091F2C92_2_6091F2C9
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096923E2_2_6096923E
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6093323D2_2_6093323D
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095C3142_2_6095C314
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609503122_2_60950312
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094D33B2_2_6094D33B
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6093B3682_2_6093B368
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096748C2_2_6096748C
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6093F42E2_2_6093F42E
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609544702_2_60954470
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609615FA2_2_609615FA
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096A5EE2_2_6096A5EE
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096D6A42_2_6096D6A4
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609606A82_2_609606A8
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609326542_2_60932654
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609556652_2_60955665
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094B7DB2_2_6094B7DB
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6092F74D2_2_6092F74D
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609648072_2_60964807
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094E9BC2_2_6094E9BC
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609379292_2_60937929
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6093FAD62_2_6093FAD6
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096DAE82_2_6096DAE8
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094DA3A2_2_6094DA3A
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60936B272_2_60936B27
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60954CF62_2_60954CF6
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60950C6B2_2_60950C6B
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60966DF12_2_60966DF1
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60963D352_2_60963D35
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60909E9C2_2_60909E9C
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60951E862_2_60951E86
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60912E0B2_2_60912E0B
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60954FF82_2_60954FF8
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B8D0A62_2_00B8D0A6
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B5E0892_2_00B5E089
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B670C02_2_00B670C0
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B6BAFD2_2_00B6BAFD
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B6D32F2_2_00B6D32F
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B70DB42_2_00B70DB4
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B6B6092_2_00B6B609
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B7267D2_2_00B7267D
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B6BF152_2_00B6BF15
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B6874A2_2_00B6874A
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00408C1C appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00406AD4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 0040596C appears 117 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00407904 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00403400 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00445E48 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00457FC4 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00457DB8 appears 102 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00434550 appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00403494 appears 85 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 004533B8 appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00446118 appears 58 times
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: String function: 00403684 appears 229 times
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: String function: 00B72A10 appears 128 times
        Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: file.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: photorecoverylib.exe.1.drStatic PE information: Resource name: RT_FILE type: PE32+ executable (console) x86-64, for MS Windows
        Source: photorecoverylib.exe.1.drStatic PE information: Resource name: RT_INST type: PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows
        Source: photorecoverylib.exe.1.drStatic PE information: Resource name: RT_INST type: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows
        Source: is-AHI27.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-AHI27.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-AHI27.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: PhotoRecoveryLib.exe.2.drStatic PE information: Resource name: RT_FILE type: PE32+ executable (console) x86-64, for MS Windows
        Source: PhotoRecoveryLib.exe.2.drStatic PE information: Resource name: RT_INST type: PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows
        Source: PhotoRecoveryLib.exe.2.drStatic PE information: Resource name: RT_INST type: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows
        Source: is-I6HJ6.tmp.1.drStatic PE information: Number of sections : 19 > 10
        Source: sqlite3.dll.2.drStatic PE information: Number of sections : 19 > 10
        Source: file.exe, 00000000.00000003.876435661.0000000002330000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
        Source: file.exe, 00000000.00000003.876600889.00000000020C8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
        Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal88.troj.evad.winEXE@15/38@0/2
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B5F8D0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,2_2_00B5F8D0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00455EB4 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455EB4
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: CloseServiceHandle,CreateServiceA,CloseServiceHandle,CloseServiceHandle,2_2_004016EB
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0046E5B8 GetVersion,CoCreateInstance,1_2_0046E5B8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_0040DCE3 StartServiceCtrlDispatcherA,2_2_0040DCE3
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_0040DCE3 StartServiceCtrlDispatcherA,2_2_0040DCE3
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:1444:120:WilError_03
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: photorecoverylib.exe, photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: photorecoverylib.exe, photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
        Source: photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: photorecoverylib.exe, photorecoverylib.exe, 00000002.00000003.897978531.0000000000A6C000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2734209557.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.2.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
        Source: file.exeVirustotal: Detection: 18%
        Source: file.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
        Source: file.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmp" /SL5="$203AA,4337550,56832,C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe "C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe" -i
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
        Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
        Source: unknownProcess created: C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmp" /SL5="$203AA,4337550,56832,C:\Users\user\Desktop\file.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe "C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe" -iJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: sqlite3.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Photo Recovery Library_is1Jump to behavior
        Source: file.exeStatic file information: File size 4588286 > 1048576
        Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: msvcp100.i386.pdb source: is-V0I3T.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeUnpacked PE file: 2.2.photorecoverylib.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeUnpacked PE file: 2.2.photorecoverylib.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /4
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /19
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /35
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /51
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /63
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /77
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /89
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /102
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /113
        Source: is-I6HJ6.tmp.1.drStatic PE information: section name: /124
        Source: sqlite3.dll.2.drStatic PE information: section name: /4
        Source: sqlite3.dll.2.drStatic PE information: section name: /19
        Source: sqlite3.dll.2.drStatic PE information: section name: /35
        Source: sqlite3.dll.2.drStatic PE information: section name: /51
        Source: sqlite3.dll.2.drStatic PE information: section name: /63
        Source: sqlite3.dll.2.drStatic PE information: section name: /77
        Source: sqlite3.dll.2.drStatic PE information: section name: /89
        Source: sqlite3.dll.2.drStatic PE information: section name: /102
        Source: sqlite3.dll.2.drStatic PE information: section name: /113
        Source: sqlite3.dll.2.drStatic PE information: section name: /124
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004849F4 push 00484B02h; ret 1_2_00484AFA
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0040995C push 00409999h; ret 1_2_00409991
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00458060 push 00458098h; ret 1_2_00458090
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004860E4 push ecx; mov dword ptr [esp], ecx1_2_004860E9
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004783C8 push ecx; mov dword ptr [esp], edx1_2_004783C9
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004104F0 push ecx; mov dword ptr [esp], edx1_2_004104F5
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0049AD44 pushad ; retf 1_2_0049AD53
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0040CE48 push ecx; mov dword ptr [esp], edx1_2_0040CE4A
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00459378 push 004593BCh; ret 1_2_004593B4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0040F3A8 push ecx; mov dword ptr [esp], edx1_2_0040F3AA
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004434B4 push ecx; mov dword ptr [esp], ecx1_2_004434B8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0045186C push 0045189Fh; ret 1_2_00451897
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00451A30 push ecx; mov dword ptr [esp], eax1_2_00451A35
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00495BE4 push ecx; mov dword ptr [esp], ecx1_2_00495BE9
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00419C38 push ecx; mov dword ptr [esp], ecx1_2_00419C3D
        Source: is-6E918.tmp.1.drStatic PE information: section name: .text entropy: 6.90903234258047

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00B5E8B2
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\icuin51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\msvcr100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\Qt5PrintSupport.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\Qt5Concurrent.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-6E918.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-V0I3T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-K1S5M.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\sqlite3.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeFile created: C:\ProgramData\PhotoRecoveryLib\sqlite3.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\libEGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-QDB3N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-RCQCM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\uninstall\is-AHI27.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeFile created: C:\ProgramData\PhotoRecoveryLib\PhotoRecoveryLib.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-N9I92.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\msvcp100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\icuuc51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\libGLESv2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-I6HJ6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-140KI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-ED1JI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeFile created: C:\ProgramData\PhotoRecoveryLib\PhotoRecoveryLib.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeFile created: C:\ProgramData\PhotoRecoveryLib\sqlite3.dllJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00B5E8B2
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_0040DCE3 StartServiceCtrlDispatcherA,2_2_0040DCE3
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004843A8 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004843A8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0042F2F0 IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F2F0
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00B5E9B6
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\uninstall\is-AHI27.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\icuin51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\msvcr100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\Qt5PrintSupport.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\Qt5Concurrent.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-6E918.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-N9I92.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-V0I3T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-K1S5M.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\msvcp100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\icuuc51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\libEGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\libGLESv2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-QDB3N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-RCQCM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-I6HJ6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-140KI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-ED1JI.tmpJump to dropped file
        Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-6007
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeAPI coverage: 3.0 %
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe TID: 7044Thread sleep count: 79 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe TID: 7044Thread sleep time: -158000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe TID: 6352Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exe TID: 6352Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Windows\System32\svchost.exe TID: 6528Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\System32\svchost.exe TID: 6596Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00475798 FindFirstFileA,FindNextFileA,FindClose,1_2_00475798
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0046417C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0046417C
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_004645F8 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004645F8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00462BF0 FindFirstFileA,FindNextFileA,FindClose,1_2_00462BF0
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00498FDC FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00498FDC
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeThread delayed: delay time: 60000Jump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeThread delayed: delay time: 60000Jump to behavior
        Source: svchost.exe, 00000008.00000002.2732896974.0000015E59A53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: photorecoverylib.exe, 00000002.00000002.2732888991.0000000000A58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXv
        Source: svchost.exe, 00000008.00000002.2733018152.0000015E59A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6b
        Source: svchost.exe, 00000008.00000002.2732982430.0000015E59A6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:#p
        Source: photorecoverylib.exe, 00000002.00000002.2734039883.0000000003542000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: svchost.exe, 00000008.00000002.2732496866.0000015E59A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
        Source: svchost.exe, 00000008.00000002.2733054395.0000015E59A8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000008.00000002.2732982430.0000015E59A6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000`
        Source: photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW=
        Source: svchost.exe, 00000008.00000002.2732896974.0000015E59A53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000es
        Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-6763
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeAPI call chain: ExitProcess graph end nodegraph_2-60134
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\sppsvc.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\System32\sppsvc.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\System32\sppsvc.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B680FE IsDebuggerPresent,2_2_00B680FE
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B6E6BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_00B6E6BE
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B55E59 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_00B55E59
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B680E8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00B680E8
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00478DC4 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478DC4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0042EE28 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042EE28
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_00B5E86A cpuid 2_2_00B5E86A
        Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_0040520C
        Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_00405258
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: GetLocaleInfoA,1_2_00408578
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: GetLocaleInfoA,1_2_004085C4
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00458670 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458670
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmpCode function: 1_2_00455644 GetUserNameA,1_2_00455644
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46} STATEJump to behavior
        Source: svchost.exe, 00000009.00000002.2733165199.000001FF80702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
        Source: svchost.exe, 00000009.00000002.2733165199.000001FF80702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2733155463.0000000000B51000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2733849718.0000000002E4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: photorecoverylib.exe PID: 7040, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2733155463.0000000000B51000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2733849718.0000000002E4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: photorecoverylib.exe PID: 7040, type: MEMORYSTR
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,2_2_609660FA
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,2_2_6090C1D6
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,2_2_60963143
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_6096A2BD
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,2_2_6096923E
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,2_2_6096A38C
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,2_2_6096748C
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,2_2_609254B1
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_6094B407
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6090F435 sqlite3_bind_parameter_index,2_2_6090F435
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,2_2_609255D4
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609255FF sqlite3_bind_text,2_2_609255FF
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,2_2_6096A5EE
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,2_2_6094B54C
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,2_2_60925686
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,2_2_6094A6C5
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,2_2_609256E5
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,2_2_6094B6ED
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6092562A sqlite3_bind_blob,2_2_6092562A
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,2_2_60925655
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_6094C64A
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,2_2_609687A7
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_6095F7F7
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,2_2_6092570B
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095F772
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,2_2_60925778
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6090577D sqlite3_bind_parameter_name,2_2_6090577D
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,2_2_6094B764
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6090576B sqlite3_bind_parameter_count,2_2_6090576B
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,2_2_6094A894
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095F883
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,2_2_6094C8C2
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,2_2_6096281E
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,2_2_6096583A
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,2_2_6095F9AD
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6094A92B
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6090EAE5 sqlite3_transfer_bindings,2_2_6090EAE5
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,2_2_6095FB98
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,2_2_6095ECA6
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095FCCE
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_6095FDAE
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,2_2_60966DF1
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_60969D75
        Source: C:\Users\user\AppData\Local\Photo Recovery Library 5.7\photorecoverylib.exeCode function: 2_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,2_2_6095FFB2
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Disable or Modify Tools
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Native API
        5
        Windows Service
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Command and Scripting Interpreter
        1
        Bootkit
        1
        Access Token Manipulation
        3
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts2
        Service Execution
        Login Hook5
        Windows Service
        21
        Software Packing
        NTDS46
        System Information Discovery
        Distributed Component Object ModelInput Capture12
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets81
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
        Virtualization/Sandbox Evasion
        DCSync41
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        System Network Configuration Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1631926 Sample: file.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 88 47 Multi AV Scanner detection for submitted file 2->47 49 Detected unpacking (changes PE section rights) 2->49 51 Detected unpacking (overwrites its own PE header) 2->51 53 4 other signatures 2->53 7 file.exe 2 2->7         started        10 svchost.exe 2->10         started        13 svchost.exe 1 1 2->13         started        16 5 other processes 2->16 process3 dnsIp4 37 C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32 7->37 dropped 18 file.tmp 18 26 7->18         started        55 Changes security center settings (notifications, updates, antivirus, firewall) 10->55 21 MpCmdRun.exe 2 10->21         started        45 127.0.0.1 unknown unknown 13->45 file5 signatures6 process7 file8 29 C:\Users\user\...\photorecoverylib.exe, PE32 18->29 dropped 31 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 18->31 dropped 33 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->33 dropped 35 21 other files (none is malicious) 18->35 dropped 23 photorecoverylib.exe 1 19 18->23         started        27 conhost.exe 21->27         started        process9 dnsIp10 43 176.113.115.96, 443, 49690 SELECTELRU Russian Federation 23->43 39 C:\ProgramData\PhotoRecoveryLib\sqlite3.dll, PE32 23->39 dropped 41 C:\ProgramData\...\PhotoRecoveryLib.exe, PE32 23->41 dropped file11

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe8%ReversingLabs
        file.exe18%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\ProgramData\PhotoRecoveryLib\sqlite3.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\Qt5Concurrent.dll (copy)4%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\Qt5PrintSupport.dll (copy)4%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\icuin51.dll (copy)2%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\icuuc51.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-140KI.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-6E918.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-ED1JI.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-I6HJ6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-K1S5M.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-N9I92.tmp4%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-QDB3N.tmp4%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-RCQCM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\is-V0I3T.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\libEGL.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\libGLESv2.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\msvcp100.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\msvcr100.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\sqlite3.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\uninstall\is-AHI27.tmp3%ReversingLabs
        C:\Users\user\AppData\Local\Photo Recovery Library 5.7\uninstall\unins000.exe (copy)3%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-DTBFQ.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-V1UC2.tmp\file.tmp3%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://176.113.115.96/L0%Avira URL Cloudsafe
        https://nanoways.com/qr/%10%Avira URL Cloudsafe
        https://nanoways.com/activate0%Avira URL Cloudsafe
        https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=0%Avira URL Cloudsafe
        https://t0.ssl.ak.dynamic.tiles.vpC0%Avira URL Cloudsafe
        https://176.113.115.96/ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd85241ab258d84629326be8ea43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd7d4915f4cc10%Avira URL Cloudsafe
        http://www.bingmapsportal.com0%Avira URL Cloudsafe
        https://nanoways.com/deactivate0%Avira URL Cloudsafe
        https://nanoways.com/deactivate/?prefill=%hs0%Avira URL Cloudsafe
        https://nanoways.com/activate/?prefill=%hs0%Avira URL Cloudsafe
        https://t0.ssl.ak.dyn0%Avira URL Cloudsafe
        https://dynamic.t0%Avira URL Cloudsafe
        https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=0%Avira URL Cloudsafe
        http://www.remobjects.com/psU0%Avira URL Cloudsafe
        https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=0%Avira URL Cloudsafe
        http://nanoways.com/check/%hs0%Avira URL Cloudsafe
        https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=0%Avira URL Cloudsafe
        https://176.113.115.96/ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd852410%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        https://176.113.115.96/ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd85241ab258d84629326be8ea43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd7d4915f4cc1false
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://176.113.115.96/Lphotorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000004.00000002.1369667719.000001D5CAE68000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://176.113.115.96/photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B15000.00000004.00000020.00020000.00000000.sdmp, photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://nanoways.com/qr/%1PhotoRecoveryLib.exe.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUfile.exefalse
                  high
                  https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://t0.ssl.ak.dynamic.tiles.vpCsvchost.exe, 00000004.00000003.1369153560.000001D5CAE31000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000004.00000003.1369036849.000001D5CAE5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369101779.000001D5CAE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369691577.000001D5CAE81000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000004.00000002.1369605520.000001D5CAE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://nanoways.com/activatePhotoRecoveryLib.exe.2.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://nanoways.com/deactivatePhotoRecoveryLib.exe.2.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.bingmapsportal.comsvchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000004.00000003.1369101779.000001D5CAE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369592263.000001D5CAE3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368987440.000001D5CAE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369667719.000001D5CAE68000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.innosetup.com/file.tmp, file.tmp, 00000001.00000002.2732189124.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.drfalse
                                  high
                                  https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000004.00000003.1369057942.000001D5CAE5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://www.openssl.org/docs/faq.htmlPhotoRecoveryLib.exe.2.drfalse
                                        high
                                        https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000004.00000002.1369704181.000001D5CAE88000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368901090.000001D5CAE86000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000004.00000002.1369563898.000001D5CAE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368987440.000001D5CAE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369667719.000001D5CAE68000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369592263.000001D5CAE3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvssvchost.exe, 00000004.00000003.1369153560.000001D5CAE31000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000004.00000003.1369112838.000001D5CAE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369629824.000001D5CAE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinefile.exefalse
                                                    high
                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000004.00000003.1369036849.000001D5CAE5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369605520.000001D5CAE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://nanoways.com/activate/?prefill=%hsPhotoRecoveryLib.exe.2.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000004.00000003.1369112838.000001D5CAE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://icu-project.orgis-140KI.tmp.1.dr, is-ED1JI.tmp.1.drfalse
                                                            high
                                                            https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000004.00000002.1369629824.000001D5CAE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://nanoways.com/deactivate/?prefill=%hsPhotoRecoveryLib.exe.2.drfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://t0.ssl.ak.dynsvchost.exe, 00000004.00000003.1369153560.000001D5CAE31000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.remobjects.com/psUfile.exe, 00000000.00000003.876435661.0000000002330000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.876600889.00000000020C8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.2732189124.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.drfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://dynamic.tsvchost.exe, 00000004.00000003.1369128551.000001D5CAE41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://g.live.com/odclientsettings/Prod-C:edb.log.3.drfalse
                                                                  high
                                                                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 00000003.00000003.1207075388.000001F6D8E60000.00000004.00000800.00020000.00000000.sdmp, edb.log.3.drfalse
                                                                      high
                                                                      https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000004.00000002.1369629824.000001D5CAE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://www.remobjects.com/psfile.exe, 00000000.00000003.876435661.0000000002330000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.876600889.00000000020C8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000002.2732189124.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.drfalse
                                                                            high
                                                                            https://www.easycutstudio.com/support.htmlfile.exe, 00000000.00000002.2732565926.00000000020C1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.875695832.00000000020C1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.875588106.0000000002330000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.877978618.0000000002378000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.2732626716.0000000000654000.00000004.00000020.00020000.00000000.sdmp, file.tmp, 00000001.00000002.2733349175.0000000002378000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.877877861.0000000003250000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://nanoways.com/check/%hsPhotoRecoveryLib.exe.2.drfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000004.00000003.1369068481.000001D5CAE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://176.113.115.96/ai/?key=8f3f2b3ab71046392219e2a5231678fbb38f926d19fe6595cd66946851e91fcd85241photorecoverylib.exe, 00000002.00000002.2732888991.0000000000B34000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000004.00000002.1369691577.000001D5CAE81000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000004.00000003.1369112838.000001D5CAE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1368999689.000001D5CAE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.1369654225.000001D5CAE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  176.113.115.96
                                                                                  unknownRussian Federation
                                                                                  49505SELECTELRUfalse
                                                                                  IP
                                                                                  127.0.0.1
                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                  Analysis ID:1631926
                                                                                  Start date and time:2025-03-07 17:32:10 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 7m 48s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Run name:Run with higher sleep bypass
                                                                                  Number of analysed new started processes analysed:13
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:file.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal88.troj.evad.winEXE@15/38@0/2
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 92%
                                                                                  • Number of executed functions: 172
                                                                                  • Number of non-executed functions: 289
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                  • Exclude process from analysis (whitelisted): WMIADAP.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 23.199.214.10
                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, e16604.f.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, c.pki.goog
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  No simulations
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  176.113.115.96tKBxw8eOIV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    tKBxw8eOIV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                      soft.exeGet hashmaliciousGCleaner, LummaC Stealer, Socks5SystemzBrowse
                                                                                        9uWGaRcOv8.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                          9uWGaRcOv8.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                silk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                  silk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    No context
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    SELECTELRUnabmpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 45.10.108.219
                                                                                                    NIwz1MK5d8.exeGet hashmaliciousAmadeyBrowse
                                                                                                    • 176.113.115.6
                                                                                                    https://cdn.discordapp.com/attachments/1208290127424528417/1347131831350464562/mzSeCT06HitK85Fb.exe?ex=67cab5c9&is=67c96449&hm=1f5dd426eb7614f3776b7dafbe51534751657ba41ccf0472c966fb8b5a3984a3&Get hashmaliciousUnknownBrowse
                                                                                                    • 5.178.87.202
                                                                                                    5c9465cda4.exeGet hashmaliciousAmadey, GCleaner, LiteHTTP Bot, LummaC Stealer, Mint Stealer, PureLog Stealer, StealcBrowse
                                                                                                    • 176.113.115.6
                                                                                                    GMOgZgNpNu.exeGet hashmaliciousAmadey, LummaC StealerBrowse
                                                                                                    • 176.113.115.6
                                                                                                    xIwQcY1fc4.exeGet hashmaliciousAmadey, GCleaner, LummaC Stealer, PureLog StealerBrowse
                                                                                                    • 176.113.115.6
                                                                                                    zPlhdcABwL.exeGet hashmaliciousAmadeyBrowse
                                                                                                    • 176.113.115.6
                                                                                                    d5Wai5fIAK.exeGet hashmaliciousAmadey, GCleaner, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                                                                                    • 176.113.115.6
                                                                                                    2raqmphRKT.exeGet hashmaliciousAmadey, LummaC Stealer, PureLog StealerBrowse
                                                                                                    • 176.113.115.6
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    51c64c77e60f3980eea90869b68c58a8tKBxw8eOIV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    tKBxw8eOIV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    xn3nGSFdRn.exeGet hashmaliciousVidarBrowse
                                                                                                    • 176.113.115.96
                                                                                                    soft.exeGet hashmaliciousGCleaner, LummaC Stealer, Socks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    9uWGaRcOv8.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    9uWGaRcOv8.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    • 176.113.115.96
                                                                                                    yMwA2Hcj3Q.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                                    • 176.113.115.96
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    C:\ProgramData\PhotoRecoveryLib\sqlite3.dlltKBxw8eOIV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                      tKBxw8eOIV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                        soft.exeGet hashmaliciousGCleaner, LummaC Stealer, Socks5SystemzBrowse
                                                                                                          9uWGaRcOv8.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                            9uWGaRcOv8.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                  silk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                    silk.exeGet hashmaliciousSocks5SystemzBrowse