Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HCoITD94bW.exe

Overview

General Information

Sample name:HCoITD94bW.exe
renamed because original name is a hash value
Original sample name:ab4f29a8a4b75804687788d6f228e7f1162173ea7ac8bec283ee178a428b87f9.exe
Analysis ID:1632384
MD5:f0788618986f493a4efc60cd0f84379a
SHA1:872b98d7dc7f1269e93f34ef10105a735265129a
SHA256:ab4f29a8a4b75804687788d6f228e7f1162173ea7ac8bec283ee178a428b87f9
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Contains functionality to register a low level keyboard hook
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • HCoITD94bW.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\HCoITD94bW.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
    • HCoITD94bW.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\HCoITD94bW.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
  • AppData.exe (PID: 7756 cmdline: "C:\Users\user\AppData\Roaming\AppData\AppData.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
    • AppData.exe (PID: 7820 cmdline: "C:\Users\user\AppData\Roaming\AppData\AppData.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
  • AppData.exe (PID: 1628 cmdline: "C:\Users\user\AppData\Roaming\AppData\AppData.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
    • AppData.exe (PID: 3180 cmdline: "C:\Users\user\AppData\Roaming\AppData\AppData.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
    • AppData.exe (PID: 2404 cmdline: "C:\Users\user\AppData\Roaming\AppData\AppData.exe" MD5: F0788618986F493A4EFC60CD0F84379A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"C2 url": "https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendMessage?chat_id=5632751450"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.1359535705.00000000046A9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000C.00000002.1359535705.00000000046A9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x241ba:$a20: get_LastAccessed
      • 0x2628e:$a30: set_GuidMasterKey
      • 0x2428b:$a33: get_Clipboard
      • 0x24299:$a34: get_Keyboard
      • 0x25401:$a35: get_ShiftKeyDown
      • 0x25412:$a36: get_AltKeyDown
      • 0x242a6:$a37: get_Password
      • 0x24cd2:$a38: get_PasswordHash
      • 0x25b3e:$a39: get_DefaultCredentials
      00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 41 entries
            SourceRuleDescriptionAuthorStrings
            0.2.HCoITD94bW.exe.36ba508.0.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.HCoITD94bW.exe.36ba508.0.raw.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x23b12:$a20: get_LastAccessed
              • 0x25be6:$a30: set_GuidMasterKey
              • 0x23be3:$a33: get_Clipboard
              • 0x23bf1:$a34: get_Keyboard
              • 0x24d59:$a35: get_ShiftKeyDown
              • 0x24d6a:$a36: get_AltKeyDown
              • 0x23bfe:$a37: get_Password
              • 0x2462a:$a38: get_PasswordHash
              • 0x25496:$a39: get_DefaultCredentials
              0.2.HCoITD94bW.exe.36ba508.0.raw.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x272b4:$s10: logins
              • 0x26d42:$s11: credential
              • 0x23be3:$g1: get_Clipboard
              • 0x23bf1:$g2: get_Keyboard
              • 0x23bfe:$g3: get_Password
              • 0x24d49:$g4: get_CtrlKeyDown
              • 0x24d59:$g5: get_ShiftKeyDown
              • 0x24d6a:$g6: get_AltKeyDown
              0.2.HCoITD94bW.exe.36ba508.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.HCoITD94bW.exe.36ba508.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                • 0x21d12:$a20: get_LastAccessed
                • 0x23de6:$a30: set_GuidMasterKey
                • 0x21de3:$a33: get_Clipboard
                • 0x21df1:$a34: get_Keyboard
                • 0x22f59:$a35: get_ShiftKeyDown
                • 0x22f6a:$a36: get_AltKeyDown
                • 0x21dfe:$a37: get_Password
                • 0x2282a:$a38: get_PasswordHash
                • 0x23696:$a39: get_DefaultCredentials
                Click to see the 25 entries

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\AppData\AppData.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\HCoITD94bW.exe, ProcessId: 7364, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AppData
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:10:48.359928+010028517791Malware Command and Control Activity Detected192.168.2.1049682149.154.167.220443TCP
                2025-03-07T23:11:05.128406+010028517791Malware Command and Control Activity Detected192.168.2.1049690149.154.167.220443TCP
                2025-03-07T23:11:12.299540+010028517791Malware Command and Control Activity Detected192.168.2.1049693149.154.167.220443TCP
                2025-03-07T23:12:23.539899+010028517791Malware Command and Control Activity Detected192.168.2.1049697149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:10:48.359928+010028528151Malware Command and Control Activity Detected192.168.2.1049682149.154.167.220443TCP
                2025-03-07T23:10:52.792139+010028528151Malware Command and Control Activity Detected192.168.2.1049683149.154.167.220443TCP
                2025-03-07T23:11:05.128406+010028528151Malware Command and Control Activity Detected192.168.2.1049690149.154.167.220443TCP
                2025-03-07T23:11:08.463458+010028528151Malware Command and Control Activity Detected192.168.2.1049691149.154.167.220443TCP
                2025-03-07T23:11:12.299540+010028528151Malware Command and Control Activity Detected192.168.2.1049693149.154.167.220443TCP
                2025-03-07T23:11:15.522295+010028528151Malware Command and Control Activity Detected192.168.2.1049694149.154.167.220443TCP
                2025-03-07T23:12:23.539899+010028528151Malware Command and Control Activity Detected192.168.2.1049697149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:10:48.864375+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049682TCP
                2025-03-07T23:10:53.301863+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049683TCP
                2025-03-07T23:11:05.555389+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049690TCP
                2025-03-07T23:11:08.841924+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049691TCP
                2025-03-07T23:11:12.798210+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049693TCP
                2025-03-07T23:11:16.182114+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049694TCP
                2025-03-07T23:12:23.768622+010028542811A Network Trojan was detected149.154.167.220443192.168.2.1049697TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:10:48.068804+010018100081Potentially Bad Traffic192.168.2.1049682149.154.167.220443TCP
                2025-03-07T23:10:52.490616+010018100081Potentially Bad Traffic192.168.2.1049683149.154.167.220443TCP
                2025-03-07T23:11:04.741909+010018100081Potentially Bad Traffic192.168.2.1049690149.154.167.220443TCP
                2025-03-07T23:11:08.084337+010018100081Potentially Bad Traffic192.168.2.1049691149.154.167.220443TCP
                2025-03-07T23:11:11.772278+010018100081Potentially Bad Traffic192.168.2.1049693149.154.167.220443TCP
                2025-03-07T23:11:15.193853+010018100081Potentially Bad Traffic192.168.2.1049694149.154.167.220443TCP
                2025-03-07T23:12:23.178132+010018100081Potentially Bad Traffic192.168.2.1049697149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: HCoITD94bW.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeAvira: detection malicious, Label: TR/AD.GenSteal.qzqrd
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendMessage?chat_id=5632751450"}
                Source: HCoITD94bW.exe.7364.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendMessage"}
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeReversingLabs: Detection: 78%
                Source: HCoITD94bW.exeReversingLabs: Detection: 78%
                Source: HCoITD94bW.exeVirustotal: Detection: 79%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: HCoITD94bW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49681 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49682 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49683 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49688 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49690 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49691 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49692 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49693 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49694 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49697 version: TLS 1.2
                Source: HCoITD94bW.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: wZnH.pdb source: HCoITD94bW.exe, AppData.exe.2.dr
                Source: Binary string: wZnH.pdbSHA256o source: HCoITD94bW.exe, AppData.exe.2.dr

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49690 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49693 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49683 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49691 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.10:49693 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49694 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49693 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.10:49690 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49690 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49682 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49697 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49691 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49683 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49694 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.10:49682 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49682 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49691
                Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.10:49697 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.10:49697 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49683
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49694
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49693
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49690
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49682
                Source: Network trafficSuricata IDS: 2854281 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla CnC Response Inbound : 149.154.167.220:443 -> 192.168.2.10:49697
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9baa2e5b73Host: api.telegram.orgContent-Length: 1073Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9d8fd07bfaHost: api.telegram.orgContent-Length: 1608Expect: 100-continue
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9b70eda7f3Host: api.telegram.orgContent-Length: 1073Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9d70da3f04Host: api.telegram.orgContent-Length: 1608Expect: 100-continue
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9b7705f000Host: api.telegram.orgContent-Length: 1073Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9d7369cc85Host: api.telegram.orgContent-Length: 1608Expect: 100-continue
                Source: global trafficHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5fdae3f872fdHost: api.telegram.orgContent-Length: 981Expect: 100-continue
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd5d9baa2e5b73Host: api.telegram.orgContent-Length: 1073Expect: 100-continueConnection: Keep-Alive
                Source: AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003502000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003474000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.00000000030C8000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000003072000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.0000000003526000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: HCoITD94bW.exe, AppData.exe.2.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                Source: AppData.exe, 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://A6uxKavPK33BnTXZ.org
                Source: AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgMozilla/5.0
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003502000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003474000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.00000000030C8000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000003072000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.0000000003526000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003474000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000030F2000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000003072000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/
                Source: AppData.exe, 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/5632751450appdataAppDataA
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003502000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003474000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000030F2000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.00000000030C8000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.0000000003072000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.0000000003526000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5902621720:AAG63saKfqN8L1Gxy5Zs-PFqX69DHY3i2Yg/sendDocument
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
                Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
                Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49681
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
                Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
                Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49681 -> 443
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49681 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49682 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49683 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49688 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49690 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49691 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49692 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49693 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49694 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49697 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07232CD8 SetWindowsHookExW 0000000D,00000000,?,?2_2_07232CD8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\HCoITD94bW.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\AppData\AppData.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\AppData\AppData.exe
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindow created: window name: CLIPBRDWNDCLASS

                System Summary

                barindex
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.HCoITD94bW.exe.36ba508.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.36ba508.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.AppData.exe.44b29b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 12.2.AppData.exe.44b29b0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.AppData.exe.4489990.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 12.2.AppData.exe.4489990.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.AppData.exe.44b29b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 12.2.AppData.exe.44b29b0.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.AppData.exe.4489990.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 12.2.AppData.exe.4489990.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0000000C.00000002.1359535705.00000000046A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0000000C.00000002.1359535705.0000000004489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000005.00000002.3544840309.0000000000425000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.1095948057.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.1095948057.0000000003EF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: HCoITD94bW.exe PID: 7268, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: AppData.exe PID: 1628, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, E5A48D8E-6D6C-435A-85D1-A169C2581EDC.csLarge array initialization: E5A48D8E_002D6D6C_002D435A_002D85D1_002DA169C2581EDC: array initializer size 9532
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, E5A48D8E-6D6C-435A-85D1-A169C2581EDC.csLarge array initialization: E5A48D8E_002D6D6C_002D435A_002D85D1_002DA169C2581EDC: array initializer size 9532
                Source: 12.2.AppData.exe.44b29b0.2.raw.unpack, E5A48D8E-6D6C-435A-85D1-A169C2581EDC.csLarge array initialization: E5A48D8E_002D6D6C_002D435A_002D85D1_002DA169C2581EDC: array initializer size 9532
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_04BDD3E40_2_04BDD3E4
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694E6F80_2_0694E6F8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06947CB80_2_06947CB8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06946D980_2_06946D98
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694CD800_2_0694CD80
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06945B880_2_06945B88
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694E6E90_2_0694E6E9
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694D4B00_2_0694D4B0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694D4C00_2_0694D4C0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694A5400_2_0694A540
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694D25A0_2_0694D25A
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694D2680_2_0694D268
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_069463990_2_06946399
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694A3800_2_0694A380
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694A3700_2_0694A370
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694A0F00_2_0694A0F0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694A0E10_2_0694A0E1
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694D0180_2_0694D018
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694E0180_2_0694E018
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694D0080_2_0694D008
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694E00A0_2_0694E00A
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06949F800_2_06949F80
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06949F700_2_06949F70
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06944C990_2_06944C99
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06947C3E0_2_06947C3E
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06948D100_2_06948D10
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06948D000_2_06948D00
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694CD6F0_2_0694CD6F
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694EBD00_2_0694EBD0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_0694EBC00_2_0694EBC0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06949B500_2_06949B50
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06945B770_2_06945B77
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A584B80_2_06A584B8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A565380_2_06A56538
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A513B90_2_06A513B9
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A560F10_2_06A560F1
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A57BE00_2_06A57BE0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_02F1A9D82_2_02F1A9D8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_02F177DB2_2_02F177DB
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_02F19DC02_2_02F19DC0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_02F1A1082_2_02F1A108
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_072344A02_2_072344A0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_072386282_2_07238628
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_0723B6682_2_0723B668
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_072354E82_2_072354E8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078466082_2_07846608
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_0784B3182_2_0784B318
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07843A902_2_07843A90
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078482B02_2_078482B0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078442302_2_07844230
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078408902_2_07840890
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078407402_2_07840740
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07844EC82_2_07844EC8
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078413182_2_07841318
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_0784F3482_2_0784F348
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_0784824D2_2_0784824D
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078441D02_2_078441D0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C5BB682_2_07C5BB68
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C515302_2_07C51530
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C560C02_2_07C560C0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C5CD562_2_07C5CD56
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C5CD582_2_07C5CD58
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C539782_2_07C53978
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_0306D3E44_2_0306D3E4
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076F65384_2_076F6538
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076F84B84_2_076F84B8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076F60F14_2_076F60F1
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076F7BE04_2_076F7BE0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE5B884_2_08DE5B88
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE7CB84_2_08DE7CB8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DECD804_2_08DECD80
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE6DA84_2_08DE6DA8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEE6F84_2_08DEE6F8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEA0F04_2_08DEA0F0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEA0E14_2_08DEA0E1
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DED0184_2_08DED018
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEE0184_2_08DEE018
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEE00B4_2_08DEE00B
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DED0084_2_08DED008
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DED25B4_2_08DED25B
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DED2684_2_08DED268
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEEBD04_2_08DEEBD0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEEBC04_2_08DEEBC0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE63994_2_08DE6399
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEA3804_2_08DEA380
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE63A84_2_08DE63A8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE9B504_2_08DE9B50
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE5B774_2_08DE5B77
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEA3704_2_08DEA370
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE9B604_2_08DE9B60
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DED4C04_2_08DED4C0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE4C994_2_08DE4C99
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE7CB74_2_08DE7CB7
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DED4B04_2_08DED4B0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE4CA84_2_08DE4CA8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE7C784_2_08DE7C78
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE6D984_2_08DE6D98
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEA5504_2_08DEA550
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEA5404_2_08DEA540
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DECD6F4_2_08DECD6F
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE8D104_2_08DE8D10
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE8D004_2_08DE8D00
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DEE6E94_2_08DEE6E9
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE9F804_2_08DE9F80
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE9F704_2_08DE9F70
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_0138A1085_2_0138A108
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_0138A9D85_2_0138A9D8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_013877DA5_2_013877DA
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_01389DC05_2_01389DC0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_058B75D85_2_058B75D8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_058B68405_2_058B6840
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_058B41295_2_058B4129
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_058B1B485_2_058B1B48
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9F2805_2_06E9F280
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E990505_2_06E99050
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EAF6F05_2_06EAF6F0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EA36995_2_06EA3699
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EA9AE05_2_06EA9AE0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EAA0A85_2_06EAA0A8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EABE805_2_06EABE80
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC56405_2_06EC5640
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06ECEA385_2_06ECEA38
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC6CED5_2_06EC6CED
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC30D85_2_06EC30D8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC50A85_2_06EC50A8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06ECA4B05_2_06ECA4B0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC64805_2_06EC6480
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC00405_2_06EC0040
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06EC30795_2_06EC3079
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06ECE1E85_2_06ECE1E8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_01076F9012_2_01076F90
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0107D3E412_2_0107D3E4
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08817BE012_2_08817BE0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08815CB012_2_08815CB0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08815CC812_2_08815CC8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_088160F112_2_088160F1
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_088184B812_2_088184B8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0881653812_2_08816538
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08825B8812_2_08825B88
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08827CB812_2_08827CB8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882CD8012_2_0882CD80
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08826D9812_2_08826D98
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882E6F812_2_0882E6F8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882A0E112_2_0882A0E1
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882A0F012_2_0882A0F0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882E00B12_2_0882E00B
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882D00812_2_0882D008
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882D01812_2_0882D018
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882E01812_2_0882E018
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882D25B12_2_0882D25B
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882D26812_2_0882D268
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882A38012_2_0882A380
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882639912_2_08826399
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882EBC012_2_0882EBC0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882EBD012_2_0882EBD0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08829B5012_2_08829B50
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882A37012_2_0882A370
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08825B7712_2_08825B77
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08824C9B12_2_08824C9B
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08827CAB12_2_08827CAB
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882D4B012_2_0882D4B0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882D4C012_2_0882D4C0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08828D0012_2_08828D00
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08828D1012_2_08828D10
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882A54012_2_0882A540
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882CD6F12_2_0882CD6F
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_0882E6E912_2_0882E6E9
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08829F8012_2_08829F80
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 12_2_08829F7012_2_08829F70
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_030AA9D814_2_030AA9D8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_030A77DB14_2_030A77DB
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_030A9DC014_2_030A9DC0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_030AA10814_2_030AA108
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D727C914_2_05D727C9
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D737B614_2_05D737B6
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D7E77814_2_05D7E778
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D7276714_2_05D72767
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D7271F14_2_05D7271F
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D7264014_2_05D72640
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D7335014_2_05D73350
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_05D72A7614_2_05D72A76
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075975D814_2_075975D8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_07591B4814_2_07591B48
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_0759004014_2_07590040
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_0759412914_2_07594129
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075D679014_2_075D6790
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075D3D3814_2_075D3D38
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075DF47814_2_075DF478
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075DDC0014_2_075DDC00
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075DA96814_2_075DA968
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075DF47714_2_075DF477
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075DBB5814_2_075DBB58
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 14_2_075DBB5714_2_075DBB57
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: String function: 030A1810 appears 39 times
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: String function: 01381680 appears 43 times
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: String function: 030A1680 appears 43 times
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: String function: 01381810 appears 39 times
                Source: HCoITD94bW.exe, 00000000.00000002.1094948447.000000000289F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5cc642c5-22a7-40a5-abd5-7bfa7f5d8946.exe4 vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000000.00000002.1095948057.0000000003EF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000000.00000002.1095948057.0000000003EF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5cc642c5-22a7-40a5-abd5-7bfa7f5d8946.exe4 vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000000.00000000.1079681571.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewZnH.exeB vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000000.00000002.1095948057.0000000003699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5cc642c5-22a7-40a5-abd5-7bfa7f5d8946.exe4 vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000000.00000002.1093682707.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000000.00000002.1109903459.000000000B100000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000002.00000002.3545475230.0000000001339000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEXPLORER.EXE.MUIj% vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $oq,\\StringFileInfo\\080904B0\\OriginalFilename vs HCoITD94bW.exe
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000030F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs HCoITD94bW.exe
                Source: HCoITD94bW.exeBinary or memory string: OriginalFilenamewZnH.exeB vs HCoITD94bW.exe
                Source: HCoITD94bW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.HCoITD94bW.exe.36ba508.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.HCoITD94bW.exe.36ba508.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.AppData.exe.44b29b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 12.2.AppData.exe.44b29b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.AppData.exe.4489990.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 12.2.AppData.exe.4489990.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.AppData.exe.44b29b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 12.2.AppData.exe.44b29b0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.AppData.exe.4489990.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 12.2.AppData.exe.4489990.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0000000C.00000002.1359535705.00000000046A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0000000C.00000002.1359535705.0000000004489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000005.00000002.3544840309.0000000000425000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.1095948057.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.1095948057.0000000003EF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: HCoITD94bW.exe PID: 7268, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: AppData.exe PID: 1628, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: HCoITD94bW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: AppData.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, F.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, F.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, F.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, F.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, E.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, E.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, E.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, E.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, E.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, kKRAy5eHKfl9wqw590.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, kKRAy5eHKfl9wqw590.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, kKRAy5eHKfl9wqw590.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, kKRAy5eHKfl9wqw590.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, kKRAy5eHKfl9wqw590.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, kKRAy5eHKfl9wqw590.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, TwXKZyRFgl4CtwdoJs.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/7@2/2
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HCoITD94bW.exe.logJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMutant created: NULL
                Source: HCoITD94bW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: HCoITD94bW.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.000000000346E000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3551197176.000000000306B000.00000004.00000800.00020000.00000000.sdmp, AppData.exe, 0000000E.00000002.3548930931.00000000034C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: HCoITD94bW.exeReversingLabs: Detection: 78%
                Source: HCoITD94bW.exeVirustotal: Detection: 79%
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile read: C:\Users\user\Desktop\HCoITD94bW.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\HCoITD94bW.exe "C:\Users\user\Desktop\HCoITD94bW.exe"
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess created: C:\Users\user\Desktop\HCoITD94bW.exe "C:\Users\user\Desktop\HCoITD94bW.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess created: C:\Users\user\Desktop\HCoITD94bW.exe "C:\Users\user\Desktop\HCoITD94bW.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: sxs.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: vaultcli.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeSection loaded: ntmarta.dll
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: HCoITD94bW.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: HCoITD94bW.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: HCoITD94bW.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wZnH.pdb source: HCoITD94bW.exe, AppData.exe.2.dr
                Source: Binary string: wZnH.pdbSHA256o source: HCoITD94bW.exe, AppData.exe.2.dr

                Data Obfuscation

                barindex
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, TwXKZyRFgl4CtwdoJs.cs.Net Code: d8ibZDl0Bk System.Reflection.Assembly.Load(byte[])
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, TwXKZyRFgl4CtwdoJs.cs.Net Code: d8ibZDl0Bk System.Reflection.Assembly.Load(byte[])
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, TwXKZyRFgl4CtwdoJs.cs.Net Code: d8ibZDl0Bk System.Reflection.Assembly.Load(byte[])
                Source: HCoITD94bW.exeStatic PE information: 0x98D08CEB [Thu Mar 30 15:53:15 2051 UTC]
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06947750 push cs; ret 0_2_06947751
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A5D1FD push FFFFFF8Bh; iretd 0_2_06A5D1FF
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 0_2_06A5BAA8 push esp; ret 0_2_06A5BAED
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078478E0 push eax; retf 2_2_078478ED
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_0784D03F pushad ; retf 2_2_0784D0B9
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_07C527BF push edi; retn 0000h2_2_07C527C1
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076FD1FD push FFFFFF8Bh; iretd 4_2_076FD1FF
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076FBAA8 push esp; ret 4_2_076FBAED
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076FB939 push cs; retf 4_2_076FB946
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_076F2899 push 7CD0076Eh; retf 4_2_076F289E
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE57A5 pushad ; retf 4_2_08DE57A6
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 4_2_08DE7750 push cs; ret 4_2_08DE7751
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_058B56C3 push ebp; iretd 5_2_058B56C8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9A768 push es; retf 5_2_06E9B03C
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B4E7 push es; retf 5_2_06E9B4F0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B4FF push es; retf 5_2_06E9B500
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B4F7 push es; retf 5_2_06E9B4F8
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B4AB push es; retf 5_2_06E9B4B0
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B4A3 push es; retf 5_2_06E9B4A4
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B463 push es; retf 5_2_06E9B464
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B453 push es; retf 5_2_06E9B454
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B423 push es; retf 5_2_06E9B424
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B403 push es; retf 5_2_06E9B40C
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B41B push es; retf 5_2_06E9B41C
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B5D3 push es; retf 5_2_06E9B5D4
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B587 push es; retf 5_2_06E9B588
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B56F push es; retf 5_2_06E9B570
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B567 push es; retf 5_2_06E9B568
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B57F push es; retf 5_2_06E9B580
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B577 push es; retf 5_2_06E9B578
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeCode function: 5_2_06E9B54F push es; retf 5_2_06E9B550
                Source: HCoITD94bW.exeStatic PE information: section name: .text entropy: 7.705531314592027
                Source: AppData.exe.2.drStatic PE information: section name: .text entropy: 7.705531314592027
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, PI80yk87oJpK0Rl74iA.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'V3xDtaMArC', 'UIIDOWIZXq', 'SZcDhmmgdo', 'AhnDfCqwfv', 'FdOD0r6WEs', 'fYfD4h7WYt', 'elJDFMi0hc'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, mKWchoKUnqByYFEnyh.csHigh entropy of concatenated method names: 'C2uy99FReo', 'wgFyUjA4M2', 'eScyeYALlK', 'GWlyKsjXZd', 'DOUymMvxQ6', 'dSyyLPmti1', 'AymyS5usbc', 'tpNyV45fAe', 'wH8yxSvIYU', 'yXuyDptZc6'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, q7gqetvCug0hv5udWc.csHigh entropy of concatenated method names: 'YbCSs8y1FC', 'vcqS3R1dZc', 'qXPV79bZmg', 'gq0V8iMIPb', 'PRISt5HJrC', 'yBKSOsF5LX', 'hCUSh0bAAx', 'nhYSfRetaf', 'rykS0xWyO4', 'RKRS4e0qjQ'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, nJB4qTFoHXGbibncOH.csHigh entropy of concatenated method names: 'd6nSjD1ZGQ', 'yNmSrk01qB', 'ToString', 'EbhSEqkpJD', 'OIJS5Ar2So', 'iPxSy3gm7F', 'cdTSNleVvd', 'EcfSAu7XbV', 'RoNS2AKMIP', 'G6CSRwiWhl'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, TwXKZyRFgl4CtwdoJs.csHigh entropy of concatenated method names: 'myjQJKWL9f', 'tJNQEm8MLm', 'suLQ5tuL6f', 'cCBQyEGYnQ', 'YyZQNtDuqJ', 'ffNQA3SUrT', 'F0BQ2naTL6', 'aKqQRKOJHB', 'ah5QMdJSnL', 'DctQjOnP1N'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, po6Efi4p42Wf6LMnkx.csHigh entropy of concatenated method names: 'ToString', 'MtWLtvF9Cv', 'TU7LuxbieS', 'dL5LYUpfSQ', 'IIgLit9bLM', 'JqcLXWsyDU', 'APoLaiNFSq', 'oY2LTOaUq5', 'xiHLlOcg9u', 'mjOLGlKUtg'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, kKRAy5eHKfl9wqw590.csHigh entropy of concatenated method names: 'zF45fMq9eQ', 'vDy50mj7yk', 'pf954sOIdh', 'jp95Fwg1w3', 'jnv5w1Yc4X', 't7g5vbGPcl', 'Rkg5WekkQB', 'qRa5sZY7Wt', 'KSl5nNrdR5', 'S2D53Ib7M4'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, nhpRVqzsddf4BrYXEr.csHigh entropy of concatenated method names: 'dEaDUyJP6i', 'fYxDefKvYC', 'i6lDKwoeRo', 'xLhDBvVZOi', 'rhRDudOwdn', 'UJxDiQSTP5', 'lKqDXlROKn', 'rypDqOn0ci', 'kKrDpy1gb5', 'kFQDHudgRk'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, SBWxvyfRioFwVe8jeZ.csHigh entropy of concatenated method names: 't03mo5fSJt', 'nxymODXtPW', 'QqgmffbtMd', 'c0Cm0S3nRQ', 'TPQmurhfih', 'MRKmYUoaW1', 'ID4mixTJuY', 'yeZmXXCa2l', 'k8jma76OCU', 'yN3mT3NIJe'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, MNyeyfGRJyNM4d92YO.csHigh entropy of concatenated method names: 'cfO2pjStmt', 'Vw62HRcl0T', 'Oom2ZS2MxQ', 'U2B29cehRw', 'H9B21ki3Ix', 'r7o2UmrPal', 'w5h26iJ9ii', 'vdv2eYOflJ', 'Ky02KIoHBd', 'sU52I2o5Q2'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, bF0hgkh86puLpmwH5Y.csHigh entropy of concatenated method names: 'vSrPeuMe2u', 'yWLPK3FJmm', 'zUnPBVvXoB', 'QYYPuKB9sW', 'BtDPibH7UH', 'ysFPXTjyyw', 'AQuPTQDjl6', 'j1nPlQcWyZ', 'DfsPoRA8Bi', 'JOLPt7d8DH'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, cYDN9mbHwm8PjAv2w8.csHigh entropy of concatenated method names: 'xWR82KRAy5', 'zKf8Rl9wqw', 'OUn8jqByYF', 'fny8rh9NUX', 'xnh8mBmq8U', 'k948LlnKDc', 'MphG785pDdm3fKyk9j', 'LE9VVR4GOBlJeba3Px', 'wBI882K249', 'R7y8QwCpy8'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, U1jAVhWgwPOnFHN0B7.csHigh entropy of concatenated method names: 'PMgxmVWJbA', 'UaxxSyBNtV', 'zW7xxlZvSs', 'THZxdVLIUE', 'ckPxg5vEhl', 'tDCxqj8bK6', 'Dispose', 'w81VEIwpRY', 'ej4V5meBcG', 'a6TVy3rqDO'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, qioHNnyJPf0YUQPlWS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rAckntQRPN', 'uuRk3LvCf0', 'JD1kz78JRx', 'D0NQ7LRvBe', 'vAnQ8Bl8vB', 'E3TQkm6nyx', 'COCQQx2tOk', 'RAqHAjgFtvq2UhK3ZNd'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, ln6u5C88JHsce7ISGNv.csHigh entropy of concatenated method names: 'j9SD31C92O', 'IEvDzickuC', 'daWd7RrOop', 'kOYd8jySBb', 'oT1dkTlNxZ', 'uYidQsoX3w', 'WT2db2VtPr', 'oRRdJsl4Bi', 'BHbdEN8xto', 'BLWd5NjE8E'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, gr3PQ03YuKAwFnNr3J.csHigh entropy of concatenated method names: 'eAgDycy0GV', 'bJiDNER8NI', 'M8IDAhMHoB', 'M5AD2uwoCQ', 'd8nDxa02RR', 'F1PDRQOlwY', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, BHfZ5TaogBSaju12Rb.csHigh entropy of concatenated method names: 'jpcA4WYVso', 'vhFAFuHe1o', 'URMAwyrbDh', 'ToString', 'BImAvfIYwP', 'lXVAWIPfwq', 'sSabD6s8ALRtJlQNVxZ', 'Tmx6uNsHMQR95ehPxB0'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, JH2vGSnhUd3SDVMVC9.csHigh entropy of concatenated method names: 'euexBbb64G', 'TABxuCmBAi', 'qg1xYXSGM0', 'BiVxihKj2Y', 'vhlxX1fqcC', 'mLoxauuC9s', 'oDYxToYMqd', 'VuMxlY146D', 'Du4xG03sfT', 'DpTxosFFd8'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, yComp85yYmFaiduPKT.csHigh entropy of concatenated method names: 'Dispose', 'oOn8nFHN0B', 'z9Zkuw4QGi', 'MLvwK5QSvL', 'aIi83yP6vW', 'li38zEU5iA', 'ProcessDialogKey', 'Miik7H2vGS', 'QUdk83SDVM', 'rC9kk5r3PQ'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, lNkkgTk1CH30Ux4saL.csHigh entropy of concatenated method names: 'nRHZYVkp7', 'zmO9qfcNY', 'DKCUQCtjE', 'P3w657IoO', 'omrKWh16p', 'y7rIsuCGP', 'L7xdVTIi15GB5qERFI', 'rQ7W0xbuIDpgtn0Oom', 'x9GV915VU', 'quZDI39lu'
                Source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, x8UR94BlnKDc8fOujq.csHigh entropy of concatenated method names: 'ILCAJhqg9p', 'N37A5flV0s', 'mkFANWDNXn', 'vl8A2OHJLM', 'zryAR766hA', 'rtnNwE6j38', 'ohcNvAsOMu', 'mP3NWZEjRS', 'BuvNsAaDnN', 'H76NnuaKDh'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, PI80yk87oJpK0Rl74iA.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'V3xDtaMArC', 'UIIDOWIZXq', 'SZcDhmmgdo', 'AhnDfCqwfv', 'FdOD0r6WEs', 'fYfD4h7WYt', 'elJDFMi0hc'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, mKWchoKUnqByYFEnyh.csHigh entropy of concatenated method names: 'C2uy99FReo', 'wgFyUjA4M2', 'eScyeYALlK', 'GWlyKsjXZd', 'DOUymMvxQ6', 'dSyyLPmti1', 'AymyS5usbc', 'tpNyV45fAe', 'wH8yxSvIYU', 'yXuyDptZc6'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, q7gqetvCug0hv5udWc.csHigh entropy of concatenated method names: 'YbCSs8y1FC', 'vcqS3R1dZc', 'qXPV79bZmg', 'gq0V8iMIPb', 'PRISt5HJrC', 'yBKSOsF5LX', 'hCUSh0bAAx', 'nhYSfRetaf', 'rykS0xWyO4', 'RKRS4e0qjQ'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, nJB4qTFoHXGbibncOH.csHigh entropy of concatenated method names: 'd6nSjD1ZGQ', 'yNmSrk01qB', 'ToString', 'EbhSEqkpJD', 'OIJS5Ar2So', 'iPxSy3gm7F', 'cdTSNleVvd', 'EcfSAu7XbV', 'RoNS2AKMIP', 'G6CSRwiWhl'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, TwXKZyRFgl4CtwdoJs.csHigh entropy of concatenated method names: 'myjQJKWL9f', 'tJNQEm8MLm', 'suLQ5tuL6f', 'cCBQyEGYnQ', 'YyZQNtDuqJ', 'ffNQA3SUrT', 'F0BQ2naTL6', 'aKqQRKOJHB', 'ah5QMdJSnL', 'DctQjOnP1N'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, po6Efi4p42Wf6LMnkx.csHigh entropy of concatenated method names: 'ToString', 'MtWLtvF9Cv', 'TU7LuxbieS', 'dL5LYUpfSQ', 'IIgLit9bLM', 'JqcLXWsyDU', 'APoLaiNFSq', 'oY2LTOaUq5', 'xiHLlOcg9u', 'mjOLGlKUtg'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, kKRAy5eHKfl9wqw590.csHigh entropy of concatenated method names: 'zF45fMq9eQ', 'vDy50mj7yk', 'pf954sOIdh', 'jp95Fwg1w3', 'jnv5w1Yc4X', 't7g5vbGPcl', 'Rkg5WekkQB', 'qRa5sZY7Wt', 'KSl5nNrdR5', 'S2D53Ib7M4'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, nhpRVqzsddf4BrYXEr.csHigh entropy of concatenated method names: 'dEaDUyJP6i', 'fYxDefKvYC', 'i6lDKwoeRo', 'xLhDBvVZOi', 'rhRDudOwdn', 'UJxDiQSTP5', 'lKqDXlROKn', 'rypDqOn0ci', 'kKrDpy1gb5', 'kFQDHudgRk'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, SBWxvyfRioFwVe8jeZ.csHigh entropy of concatenated method names: 't03mo5fSJt', 'nxymODXtPW', 'QqgmffbtMd', 'c0Cm0S3nRQ', 'TPQmurhfih', 'MRKmYUoaW1', 'ID4mixTJuY', 'yeZmXXCa2l', 'k8jma76OCU', 'yN3mT3NIJe'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, MNyeyfGRJyNM4d92YO.csHigh entropy of concatenated method names: 'cfO2pjStmt', 'Vw62HRcl0T', 'Oom2ZS2MxQ', 'U2B29cehRw', 'H9B21ki3Ix', 'r7o2UmrPal', 'w5h26iJ9ii', 'vdv2eYOflJ', 'Ky02KIoHBd', 'sU52I2o5Q2'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, bF0hgkh86puLpmwH5Y.csHigh entropy of concatenated method names: 'vSrPeuMe2u', 'yWLPK3FJmm', 'zUnPBVvXoB', 'QYYPuKB9sW', 'BtDPibH7UH', 'ysFPXTjyyw', 'AQuPTQDjl6', 'j1nPlQcWyZ', 'DfsPoRA8Bi', 'JOLPt7d8DH'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, cYDN9mbHwm8PjAv2w8.csHigh entropy of concatenated method names: 'xWR82KRAy5', 'zKf8Rl9wqw', 'OUn8jqByYF', 'fny8rh9NUX', 'xnh8mBmq8U', 'k948LlnKDc', 'MphG785pDdm3fKyk9j', 'LE9VVR4GOBlJeba3Px', 'wBI882K249', 'R7y8QwCpy8'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, U1jAVhWgwPOnFHN0B7.csHigh entropy of concatenated method names: 'PMgxmVWJbA', 'UaxxSyBNtV', 'zW7xxlZvSs', 'THZxdVLIUE', 'ckPxg5vEhl', 'tDCxqj8bK6', 'Dispose', 'w81VEIwpRY', 'ej4V5meBcG', 'a6TVy3rqDO'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, qioHNnyJPf0YUQPlWS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rAckntQRPN', 'uuRk3LvCf0', 'JD1kz78JRx', 'D0NQ7LRvBe', 'vAnQ8Bl8vB', 'E3TQkm6nyx', 'COCQQx2tOk', 'RAqHAjgFtvq2UhK3ZNd'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, ln6u5C88JHsce7ISGNv.csHigh entropy of concatenated method names: 'j9SD31C92O', 'IEvDzickuC', 'daWd7RrOop', 'kOYd8jySBb', 'oT1dkTlNxZ', 'uYidQsoX3w', 'WT2db2VtPr', 'oRRdJsl4Bi', 'BHbdEN8xto', 'BLWd5NjE8E'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, gr3PQ03YuKAwFnNr3J.csHigh entropy of concatenated method names: 'eAgDycy0GV', 'bJiDNER8NI', 'M8IDAhMHoB', 'M5AD2uwoCQ', 'd8nDxa02RR', 'F1PDRQOlwY', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, BHfZ5TaogBSaju12Rb.csHigh entropy of concatenated method names: 'jpcA4WYVso', 'vhFAFuHe1o', 'URMAwyrbDh', 'ToString', 'BImAvfIYwP', 'lXVAWIPfwq', 'sSabD6s8ALRtJlQNVxZ', 'Tmx6uNsHMQR95ehPxB0'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, JH2vGSnhUd3SDVMVC9.csHigh entropy of concatenated method names: 'euexBbb64G', 'TABxuCmBAi', 'qg1xYXSGM0', 'BiVxihKj2Y', 'vhlxX1fqcC', 'mLoxauuC9s', 'oDYxToYMqd', 'VuMxlY146D', 'Du4xG03sfT', 'DpTxosFFd8'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, yComp85yYmFaiduPKT.csHigh entropy of concatenated method names: 'Dispose', 'oOn8nFHN0B', 'z9Zkuw4QGi', 'MLvwK5QSvL', 'aIi83yP6vW', 'li38zEU5iA', 'ProcessDialogKey', 'Miik7H2vGS', 'QUdk83SDVM', 'rC9kk5r3PQ'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, lNkkgTk1CH30Ux4saL.csHigh entropy of concatenated method names: 'nRHZYVkp7', 'zmO9qfcNY', 'DKCUQCtjE', 'P3w657IoO', 'omrKWh16p', 'y7rIsuCGP', 'L7xdVTIi15GB5qERFI', 'rQ7W0xbuIDpgtn0Oom', 'x9GV915VU', 'quZDI39lu'
                Source: 0.2.HCoITD94bW.exe.b100000.5.raw.unpack, x8UR94BlnKDc8fOujq.csHigh entropy of concatenated method names: 'ILCAJhqg9p', 'N37A5flV0s', 'mkFANWDNXn', 'vl8A2OHJLM', 'zryAR766hA', 'rtnNwE6j38', 'ohcNvAsOMu', 'mP3NWZEjRS', 'BuvNsAaDnN', 'H76NnuaKDh'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, PI80yk87oJpK0Rl74iA.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'V3xDtaMArC', 'UIIDOWIZXq', 'SZcDhmmgdo', 'AhnDfCqwfv', 'FdOD0r6WEs', 'fYfD4h7WYt', 'elJDFMi0hc'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, mKWchoKUnqByYFEnyh.csHigh entropy of concatenated method names: 'C2uy99FReo', 'wgFyUjA4M2', 'eScyeYALlK', 'GWlyKsjXZd', 'DOUymMvxQ6', 'dSyyLPmti1', 'AymyS5usbc', 'tpNyV45fAe', 'wH8yxSvIYU', 'yXuyDptZc6'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, q7gqetvCug0hv5udWc.csHigh entropy of concatenated method names: 'YbCSs8y1FC', 'vcqS3R1dZc', 'qXPV79bZmg', 'gq0V8iMIPb', 'PRISt5HJrC', 'yBKSOsF5LX', 'hCUSh0bAAx', 'nhYSfRetaf', 'rykS0xWyO4', 'RKRS4e0qjQ'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, nJB4qTFoHXGbibncOH.csHigh entropy of concatenated method names: 'd6nSjD1ZGQ', 'yNmSrk01qB', 'ToString', 'EbhSEqkpJD', 'OIJS5Ar2So', 'iPxSy3gm7F', 'cdTSNleVvd', 'EcfSAu7XbV', 'RoNS2AKMIP', 'G6CSRwiWhl'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, TwXKZyRFgl4CtwdoJs.csHigh entropy of concatenated method names: 'myjQJKWL9f', 'tJNQEm8MLm', 'suLQ5tuL6f', 'cCBQyEGYnQ', 'YyZQNtDuqJ', 'ffNQA3SUrT', 'F0BQ2naTL6', 'aKqQRKOJHB', 'ah5QMdJSnL', 'DctQjOnP1N'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, po6Efi4p42Wf6LMnkx.csHigh entropy of concatenated method names: 'ToString', 'MtWLtvF9Cv', 'TU7LuxbieS', 'dL5LYUpfSQ', 'IIgLit9bLM', 'JqcLXWsyDU', 'APoLaiNFSq', 'oY2LTOaUq5', 'xiHLlOcg9u', 'mjOLGlKUtg'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, kKRAy5eHKfl9wqw590.csHigh entropy of concatenated method names: 'zF45fMq9eQ', 'vDy50mj7yk', 'pf954sOIdh', 'jp95Fwg1w3', 'jnv5w1Yc4X', 't7g5vbGPcl', 'Rkg5WekkQB', 'qRa5sZY7Wt', 'KSl5nNrdR5', 'S2D53Ib7M4'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, nhpRVqzsddf4BrYXEr.csHigh entropy of concatenated method names: 'dEaDUyJP6i', 'fYxDefKvYC', 'i6lDKwoeRo', 'xLhDBvVZOi', 'rhRDudOwdn', 'UJxDiQSTP5', 'lKqDXlROKn', 'rypDqOn0ci', 'kKrDpy1gb5', 'kFQDHudgRk'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, SBWxvyfRioFwVe8jeZ.csHigh entropy of concatenated method names: 't03mo5fSJt', 'nxymODXtPW', 'QqgmffbtMd', 'c0Cm0S3nRQ', 'TPQmurhfih', 'MRKmYUoaW1', 'ID4mixTJuY', 'yeZmXXCa2l', 'k8jma76OCU', 'yN3mT3NIJe'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, MNyeyfGRJyNM4d92YO.csHigh entropy of concatenated method names: 'cfO2pjStmt', 'Vw62HRcl0T', 'Oom2ZS2MxQ', 'U2B29cehRw', 'H9B21ki3Ix', 'r7o2UmrPal', 'w5h26iJ9ii', 'vdv2eYOflJ', 'Ky02KIoHBd', 'sU52I2o5Q2'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, bF0hgkh86puLpmwH5Y.csHigh entropy of concatenated method names: 'vSrPeuMe2u', 'yWLPK3FJmm', 'zUnPBVvXoB', 'QYYPuKB9sW', 'BtDPibH7UH', 'ysFPXTjyyw', 'AQuPTQDjl6', 'j1nPlQcWyZ', 'DfsPoRA8Bi', 'JOLPt7d8DH'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, cYDN9mbHwm8PjAv2w8.csHigh entropy of concatenated method names: 'xWR82KRAy5', 'zKf8Rl9wqw', 'OUn8jqByYF', 'fny8rh9NUX', 'xnh8mBmq8U', 'k948LlnKDc', 'MphG785pDdm3fKyk9j', 'LE9VVR4GOBlJeba3Px', 'wBI882K249', 'R7y8QwCpy8'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, U1jAVhWgwPOnFHN0B7.csHigh entropy of concatenated method names: 'PMgxmVWJbA', 'UaxxSyBNtV', 'zW7xxlZvSs', 'THZxdVLIUE', 'ckPxg5vEhl', 'tDCxqj8bK6', 'Dispose', 'w81VEIwpRY', 'ej4V5meBcG', 'a6TVy3rqDO'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, qioHNnyJPf0YUQPlWS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rAckntQRPN', 'uuRk3LvCf0', 'JD1kz78JRx', 'D0NQ7LRvBe', 'vAnQ8Bl8vB', 'E3TQkm6nyx', 'COCQQx2tOk', 'RAqHAjgFtvq2UhK3ZNd'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, ln6u5C88JHsce7ISGNv.csHigh entropy of concatenated method names: 'j9SD31C92O', 'IEvDzickuC', 'daWd7RrOop', 'kOYd8jySBb', 'oT1dkTlNxZ', 'uYidQsoX3w', 'WT2db2VtPr', 'oRRdJsl4Bi', 'BHbdEN8xto', 'BLWd5NjE8E'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, gr3PQ03YuKAwFnNr3J.csHigh entropy of concatenated method names: 'eAgDycy0GV', 'bJiDNER8NI', 'M8IDAhMHoB', 'M5AD2uwoCQ', 'd8nDxa02RR', 'F1PDRQOlwY', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, BHfZ5TaogBSaju12Rb.csHigh entropy of concatenated method names: 'jpcA4WYVso', 'vhFAFuHe1o', 'URMAwyrbDh', 'ToString', 'BImAvfIYwP', 'lXVAWIPfwq', 'sSabD6s8ALRtJlQNVxZ', 'Tmx6uNsHMQR95ehPxB0'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, JH2vGSnhUd3SDVMVC9.csHigh entropy of concatenated method names: 'euexBbb64G', 'TABxuCmBAi', 'qg1xYXSGM0', 'BiVxihKj2Y', 'vhlxX1fqcC', 'mLoxauuC9s', 'oDYxToYMqd', 'VuMxlY146D', 'Du4xG03sfT', 'DpTxosFFd8'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, yComp85yYmFaiduPKT.csHigh entropy of concatenated method names: 'Dispose', 'oOn8nFHN0B', 'z9Zkuw4QGi', 'MLvwK5QSvL', 'aIi83yP6vW', 'li38zEU5iA', 'ProcessDialogKey', 'Miik7H2vGS', 'QUdk83SDVM', 'rC9kk5r3PQ'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, lNkkgTk1CH30Ux4saL.csHigh entropy of concatenated method names: 'nRHZYVkp7', 'zmO9qfcNY', 'DKCUQCtjE', 'P3w657IoO', 'omrKWh16p', 'y7rIsuCGP', 'L7xdVTIi15GB5qERFI', 'rQ7W0xbuIDpgtn0Oom', 'x9GV915VU', 'quZDI39lu'
                Source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, x8UR94BlnKDc8fOujq.csHigh entropy of concatenated method names: 'ILCAJhqg9p', 'N37A5flV0s', 'mkFANWDNXn', 'vl8A2OHJLM', 'zryAR766hA', 'rtnNwE6j38', 'ohcNvAsOMu', 'mP3NWZEjRS', 'BuvNsAaDnN', 'H76NnuaKDh'
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile created: C:\Users\user\AppData\Roaming\AppData\AppData.exeJump to dropped file
                Source: C:\Users\user\Desktop\HCoITD94bW.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AppDataJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AppDataJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile opened: C:\Users\user\AppData\Roaming\AppData\AppData.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: HCoITD94bW.exe PID: 7268, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 7756, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 1628, type: MEMORYSTR
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 4690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 8AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 9AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 9CE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: ACE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: B170000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: C170000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: D170000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 3090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: 5090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 3230000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 5230000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 8F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 9F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: A120000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: B120000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: BB20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: CB20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: DB20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 1290000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 2C90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 12D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 1050000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 2A90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 8830000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 71F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 9830000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: A830000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: B0E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: C0E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 3060000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 31C0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory allocated: 51C0000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\HCoITD94bW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWindow / User API: threadDelayed 3316Jump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWindow / User API: threadDelayed 6501Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindow / User API: threadDelayed 5515Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindow / User API: threadDelayed 4287Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindow / User API: threadDelayed 3222
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWindow / User API: threadDelayed 6613
                Source: C:\Users\user\Desktop\HCoITD94bW.exe TID: 7288Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exe TID: 7488Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 7780Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 2416Thread sleep count: 33 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 2416Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 844Thread sleep count: 5515 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 844Thread sleep count: 4287 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 5816Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 7292Thread sleep count: 33 > 30
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 7292Thread sleep time: -30437127721620741s >= -30000s
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 7336Thread sleep count: 3222 > 30
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exe TID: 7336Thread sleep count: 6613 > 30
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\HCoITD94bW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeThread delayed: delay time: 922337203685477
                Source: AppData.exe, 0000000E.00000002.3570502764.0000000006838000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@
                Source: HCoITD94bW.exe, 00000002.00000002.3545812209.0000000001524000.00000004.00000020.00020000.00000000.sdmp, AppData.exe, 00000005.00000002.3545884346.0000000001068000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeCode function: 2_2_078421B0 LdrInitializeThunk,2_2_078421B0
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\HCoITD94bW.exeMemory written: C:\Users\user\Desktop\HCoITD94bW.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory written: C:\Users\user\AppData\Roaming\AppData\AppData.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeMemory written: C:\Users\user\AppData\Roaming\AppData\AppData.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeProcess created: C:\Users\user\Desktop\HCoITD94bW.exe "C:\Users\user\Desktop\HCoITD94bW.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeProcess created: C:\Users\user\AppData\Roaming\AppData\AppData.exe "C:\Users\user\AppData\Roaming\AppData\AppData.exe"Jump to behavior
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}<br>t-oq
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003502000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000030F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}<br><b>[ ]</b> (07/03/2025 17:49:23)<br>r
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}THtqT
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmp, HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034B6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003502000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}<br><b>[ ]</b> (07/03/2025 17:49:23)<br>r@\oqh
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.0000000003502000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}<br><b>[ ]</b> (07/03/2025 17(
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034B6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-oq
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}<br><b>[ ]</b> (07/03/2025 17:49:23)<br>LRoqD
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}THtqT
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}r{Win}<br><b>[ ]</b> (07/03/2025 17:49:23)<br>rTHtqT
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>{Win}rTHtqT
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (07/03/2025 17:24:30)<br>
                Source: HCoITD94bW.exe, 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRoq
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Users\user\Desktop\HCoITD94bW.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Users\user\Desktop\HCoITD94bW.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Users\user\AppData\Roaming\AppData\AppData.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Users\user\AppData\Roaming\AppData\AppData.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Users\user\AppData\Roaming\AppData\AppData.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Users\user\AppData\Roaming\AppData\AppData.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.36ba508.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.44b29b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.4489990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.4193ce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.44b29b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.4489990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.1359535705.00000000046A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1359535705.0000000004489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1095948057.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1095948057.0000000003EF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HCoITD94bW.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 2404, type: MEMORYSTR
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HCoITD94bW.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 2404, type: MEMORYSTR
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\FTP Navigator\Ftplist.txt
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\HCoITD94bW.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\AppData\AppData.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HCoITD94bW.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 2404, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.36ba508.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.36ba508.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.44b29b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.4489990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.4193ce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.44b29b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.4193ce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.4126ac8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.AppData.exe.4489990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HCoITD94bW.exe.40b98a8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.1359535705.00000000046A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1359535705.0000000004489000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1095948057.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1095948057.0000000003EF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HCoITD94bW.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 2404, type: MEMORYSTR
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000030CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.00000000034C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.00000000034D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3551197176.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3549792215.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3548930931.000000000320F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HCoITD94bW.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AppData.exe PID: 2404, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Registry Run Keys / Startup Folder
                112
                Process Injection
                11
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                24
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Registry Run Keys / Startup Folder
                3
                Obfuscated Files or Information
                1
                Credentials in Registry
                211
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS2
                Process Discovery
                Distributed Component Object Model21
                Input Capture
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets141
                Virtualization/Sandbox Evasion
                SSH1
                Clipboard Data
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Hidden Files and Directories
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632384 Sample: HCoITD94bW.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 32 api.telegram.org 2->32 34 api.ipify.org 2->34 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 60 8 other signatures 2->60 7 HCoITD94bW.exe 3 2->7         started        11 AppData.exe 3 2->11         started        13 AppData.exe 2 2->13         started        signatures3 58 Uses the Telegram API (likely for C&C communication) 32->58 process4 file5 30 C:\Users\user\AppData\...\HCoITD94bW.exe.log, ASCII 7->30 dropped 62 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->62 64 Contains functionality to register a low level keyboard hook 7->64 66 Injects a PE file into a foreign processes 7->66 15 HCoITD94bW.exe 17 10 7->15         started        68 Antivirus detection for dropped file 11->68 70 Multi AV Scanner detection for dropped file 11->70 20 AppData.exe 14 7 11->20         started        22 AppData.exe 13->22         started        24 AppData.exe 13->24         started        signatures6 process7 dnsIp8 36 api.telegram.org 149.154.167.220, 443, 49682, 49683 TELEGRAMRU United Kingdom 15->36 38 api.ipify.org 104.26.12.205, 443, 49681, 49688 CLOUDFLARENETUS United States 15->38 26 C:\Users\user\AppData\Roaming\...\AppData.exe, PE32 15->26 dropped 28 C:\Users\user\...\AppData.exe:Zone.Identifier, ASCII 15->28 dropped 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->40 42 Tries to steal Mail credentials (via file / registry access) 15->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->44 46 Tries to harvest and steal ftp login credentials 22->46 48 Tries to harvest and steal browser information (history, passwords, etc) 22->48 50 Installs a global keyboard hook 22->50 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.