Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eF5TnJ6Frr.exe

Overview

General Information

Sample name:eF5TnJ6Frr.exe
renamed because original name is a hash value
Original sample name:64c169c314628f2d39716e5df389ccf8.exe
Analysis ID:1633095
MD5:64c169c314628f2d39716e5df389ccf8
SHA1:2407a5cf0c01766e6e3cf374209d6ed867b02f95
SHA256:45038c6657b1e477152288793fa04a93cdca30145ea43781fde019ad7c2b385c
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Socks5Systemz
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Joe Sandbox ML detected suspicious sample
PE file has a writeable .text section
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • eF5TnJ6Frr.exe (PID: 8148 cmdline: "C:\Users\user\Desktop\eF5TnJ6Frr.exe" MD5: 64C169C314628F2D39716E5DF389CCF8)
    • eF5TnJ6Frr.tmp (PID: 8164 cmdline: "C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmp" /SL5="$204A2,3382697,56832,C:\Users\user\Desktop\eF5TnJ6Frr.exe" MD5: DFA637091792C3F3724C581EC9F04892)
      • defragtoolspro.exe (PID: 8188 cmdline: "C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe" -i MD5: E5C9D0A8A16B10B0807C9ADE3B647EFA)
  • svchost.exe (PID: 7404 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 7484 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 7524 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7736 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7752 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 3368 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2467069280.0000000002CD1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2466991985.0000000002C2E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: defragtoolspro.exe PID: 8188JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 7404, ProcessName: svchost.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-03-09T20:00:15.548078+010020287653Unknown Traffic192.168.2.449721176.113.115.96443TCP
        2025-03-09T20:00:27.983544+010020287653Unknown Traffic192.168.2.449725176.113.115.96443TCP
        2025-03-09T20:00:40.407948+010020287653Unknown Traffic192.168.2.449728176.113.115.96443TCP
        2025-03-09T20:00:51.168105+010020287653Unknown Traffic192.168.2.44973195.215.206.151443TCP
        2025-03-09T20:00:54.025219+010020287653Unknown Traffic192.168.2.44973295.215.206.151443TCP
        2025-03-09T20:00:59.597620+010020287653Unknown Traffic192.168.2.44973495.215.206.151443TCP
        2025-03-09T20:01:03.420823+010020287653Unknown Traffic192.168.2.44973595.215.206.151443TCP
        2025-03-09T20:01:06.159254+010020287653Unknown Traffic192.168.2.44973695.215.206.151443TCP
        2025-03-09T20:01:09.022061+010020287653Unknown Traffic192.168.2.44973795.215.206.151443TCP
        2025-03-09T20:01:12.226597+010020287653Unknown Traffic192.168.2.44973895.215.206.151443TCP
        2025-03-09T20:01:15.041516+010020287653Unknown Traffic192.168.2.44973995.215.206.151443TCP
        2025-03-09T20:01:17.928737+010020287653Unknown Traffic192.168.2.44974095.215.206.151443TCP
        2025-03-09T20:01:20.808335+010020287653Unknown Traffic192.168.2.44974195.215.206.151443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-03-09T20:00:51.870868+010028032742Potentially Bad Traffic192.168.2.44973195.215.206.151443TCP
        2025-03-09T20:00:54.736286+010028032742Potentially Bad Traffic192.168.2.44973295.215.206.151443TCP
        2025-03-09T20:01:00.294440+010028032742Potentially Bad Traffic192.168.2.44973495.215.206.151443TCP
        2025-03-09T20:01:04.109614+010028032742Potentially Bad Traffic192.168.2.44973595.215.206.151443TCP
        2025-03-09T20:01:06.882504+010028032742Potentially Bad Traffic192.168.2.44973695.215.206.151443TCP
        2025-03-09T20:01:09.809939+010028032742Potentially Bad Traffic192.168.2.44973795.215.206.151443TCP
        2025-03-09T20:01:12.943779+010028032742Potentially Bad Traffic192.168.2.44973895.215.206.151443TCP
        2025-03-09T20:01:15.740720+010028032742Potentially Bad Traffic192.168.2.44973995.215.206.151443TCP
        2025-03-09T20:01:18.621542+010028032742Potentially Bad Traffic192.168.2.44974095.215.206.151443TCP
        2025-03-09T20:01:21.514843+010028032742Potentially Bad Traffic192.168.2.44974195.215.206.151443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb389926d19fe6595cd66946951e91fcd85210Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb387926d19fe6595cd66946951e91fcd85210Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f842a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0eAvira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f862a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0eAvira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f852a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0eAvira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb386926d19fe6595cd66946951e91fcd85210Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38a926d19fe6595cd66946851e91fcd85241Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f872a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0eAvira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb388926d19fe6595cd66946951e91fcd85210Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38a926d19fe6595cd66946851e91fcd85241ab258d81329326be8ef43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd1d6925549c1Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38b926d19fe6595cd66946851e91fcd85241Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f842a1cec7a86d87bdb6546ad12dac0290Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f872a1cec7a86d87bdb6546ad12dac0290Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f862a1cec7a86d87bdb6546ad12dac0290Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb386926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb387926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb389926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f852a1cec7a86d87bdb6546ad12dac0290Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb388926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5Avira URL Cloud: Label: malware
        Source: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38b926d19fe6595cd66946851e91fcd85241ab258d81329326be8ef43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd1d6925549c1Avira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeAvira: detection malicious, Label: ADWARE/AVI.ICLoader.ysgvg
        Source: C:\ProgramData\DefragToolsPro\DefragToolsPro.exeAvira: detection malicious, Label: ADWARE/AVI.ICLoader.ysgvg
        Source: C:\ProgramData\DefragToolsPro\DefragToolsPro.exeReversingLabs: Detection: 39%
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeReversingLabs: Detection: 39%
        Source: eF5TnJ6Frr.exeVirustotal: Detection: 25%Perma Link
        Source: eF5TnJ6Frr.exeReversingLabs: Detection: 21%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045D230 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D230
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045D2E4 ArcFourCrypt,1_2_0045D2E4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045D2FC ArcFourCrypt,1_2_0045D2FC
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeUnpacked PE file: 2.2.defragtoolspro.exe.400000.0.unpack
        Source: eF5TnJ6Frr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Defrag Tools Pro_is1Jump to behavior
        Source: unknownHTTPS traffic detected: 95.215.206.151:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 95.215.206.151:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: eF5TnJ6Frr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: msvcp100.i386.pdb source: is-J59BF.tmp.1.dr
        Source: Binary string: msvcr100.i386.pdb source: is-5NBFO.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00475798 FindFirstFileA,FindNextFileA,FindClose,1_2_00475798
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0046417C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0046417C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004645F8 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004645F8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00462BF0 FindFirstFileA,FindNextFileA,FindClose,1_2_00462BF0
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00498FDC FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00498FDC
        Source: global trafficTCP traffic: 192.168.2.4:49733 -> 45.93.20.230:2024
        Source: Joe Sandbox ViewIP Address: 176.113.115.96 176.113.115.96
        Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49721 -> 176.113.115.96:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49741 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49734 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49738 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49736 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49732 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49737 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49728 -> 176.113.115.96:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49725 -> 176.113.115.96:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49735 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49739 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49731 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49740 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49736 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49732 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49740 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49737 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49731 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49735 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49734 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49739 -> 95.215.206.151:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49741 -> 95.215.206.151:443
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38a926d19fe6595cd66946851e91fcd85241ab258d81329326be8ef43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd1d6925549c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38b926d19fe6595cd66946851e91fcd85241ab258d81329326be8ef43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd1d6925549c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb388926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb389926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb386926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb387926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f842a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f852a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f862a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f872a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.96
        Source: unknownTCP traffic detected without corresponding DNS query: 95.215.206.151
        Source: unknownTCP traffic detected without corresponding DNS query: 95.215.206.151
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CD2B95 WSASetLastError,WSARecv,WSASetLastError,select,2_2_02CD2B95
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38a926d19fe6595cd66946851e91fcd85241ab258d81329326be8ef43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd1d6925549c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38b926d19fe6595cd66946851e91fcd85241ab258d81329326be8ef43a8f51f8a95b5cd212a91f953c588fb52d6db9f51a9a0a29d5954cad713479a672918d4348dd1d6925549c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb388926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb389926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb386926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb387926d19fe6595cd66946951e91fcd85210ee31bd505672e26e5fd09b4a145c9c4e9976278d7f0449ad5f64dd7cc9f4badbff4c50d15918a5449d3323240976481d5d5905c4dcd763cf8d5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f842a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f852a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f862a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f872a1cec7a86d87bdb6546ad12dac02909e811d61329366be8eb43a8ec4cdb8eec906920dff156d3c9b841d6d28155b2b7fdc10c06d180594f893e250f8a74d8d9d3935949cc7432f1dc0e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 95.215.206.151
        Source: is-5LK4E.tmp.1.dr, is-1K3IJ.tmp.1.drString found in binary or memory: http://icu-project.org
        Source: svchost.exe, 00000003.00000002.1364793231.0000021FE6013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
        Source: eF5TnJ6Frr.tmp, eF5TnJ6Frr.tmp, 00000001.00000002.2464766278.0000000000401000.00000020.00000001.01000000.00000004.sdmp, eF5TnJ6Frr.tmp.0.dr, is-NAA2F.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: eF5TnJ6Frr.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
        Source: eF5TnJ6Frr.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: eF5TnJ6Frr.exe, 00000000.00000003.1223562867.0000000002350000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.exe, 00000000.00000003.1223695253.0000000002088000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.tmp, eF5TnJ6Frr.tmp, 00000001.00000002.2464766278.0000000000401000.00000020.00000001.01000000.00000004.sdmp, eF5TnJ6Frr.tmp.0.dr, is-NAA2F.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: eF5TnJ6Frr.exe, 00000000.00000003.1223562867.0000000002350000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.exe, 00000000.00000003.1223695253.0000000002088000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.tmp, 00000001.00000002.2464766278.0000000000401000.00000020.00000001.01000000.00000004.sdmp, eF5TnJ6Frr.tmp.0.dr, is-NAA2F.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000003.2098151119.0000000003348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/
        Source: defragtoolspro.exe, 00000002.00000003.2098151119.0000000003348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/-
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000003.2098168723.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38c926d19fe6595cd66946851e91fcd85241
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A45000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2467457722.0000000003340000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000003.2098168723.0000000000A45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38d926d19fe6595cd66946851e91fcd85241
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000003.2098168723.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://176.113.115.96/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f926d19fe6595cd66946851e91fcd85241
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.000000000334D000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2467457722.0000000003344000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.0000000003388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb386926d19fe6595cd66946951e91fcd85210
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.0000000003388000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2467457722.0000000003344000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb387926d19fe6595cd66946951e91fcd85210
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb388926d19fe6595cd66946951e91fcd85210
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.0000000003388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb389926d19fe6595cd66946951e91fcd85210
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38a926d19fe6595cd66946851e91fcd85241
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.0000000003388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38b926d19fe6595cd66946851e91fcd85241
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.0000000003340000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2467457722.0000000003388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f842a1cec7a86d87bdb6546ad12dac0290
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.0000000003388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f852a1cec7a86d87bdb6546ad12dac0290
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.000000000334D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f862a1cec7a86d87bdb6546ad12dac0290
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.000000000334D000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A0E000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2467457722.0000000003344000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/ai/?key=8f3f2b3ab14e166f251de6a5231678fbb38f872a1cec7a86d87bdb6546ad12dac0290
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/en-GB
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/en-US
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.000000000334D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/icies
        Source: defragtoolspro.exe, 00000002.00000002.2467457722.000000000334D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://95.215.206.151/rosoft
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364864148.0000021FE6059000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
        Source: svchost.exe, 00000003.00000003.1364294790.0000021FE6062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364429472.0000021FE6041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364207406.0000021FE606E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364350172.0000021FE605E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364407060.0000021FE605A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364929038.0000021FE6063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364956812.0000021FE6070000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
        Source: svchost.exe, 00000003.00000003.1364207406.0000021FE606E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364956812.0000021FE6070000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
        Source: svchost.exe, 00000003.00000002.1364943247.0000021FE6068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364281984.0000021FE6067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
        Source: svchost.exe, 00000003.00000003.1364094531.0000021FE6075000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364971379.0000021FE6077000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
        Source: svchost.exe, 00000003.00000003.1364294790.0000021FE6062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364407060.0000021FE605A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364929038.0000021FE6063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364810207.0000021FE602B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
        Source: svchost.exe, 00000003.00000002.1364943247.0000021FE6068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364281984.0000021FE6067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364810207.0000021FE602B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
        Source: svchost.exe, 00000003.00000003.1364294790.0000021FE6062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364929038.0000021FE6063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364810207.0000021FE602B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
        Source: svchost.exe, 00000003.00000003.1364429472.0000021FE6041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
        Source: svchost.exe, 00000003.00000003.1364294790.0000021FE6062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364929038.0000021FE6063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
        Source: svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364929038.0000021FE6063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
        Source: svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
        Source: svchost.exe, 00000003.00000003.1364294790.0000021FE6062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364929038.0000021FE6063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
        Source: svchost.exe, 00000003.00000003.1364429472.0000021FE6041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
        Source: svchost.exe, 00000003.00000002.1364956812.0000021FE6070000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
        Source: svchost.exe, 00000003.00000002.1364943247.0000021FE6068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364281984.0000021FE6067000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364810207.0000021FE602B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
        Source: svchost.exe, 00000003.00000003.1364429472.0000021FE6041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
        Source: svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
        Source: svchost.exe, 00000003.00000002.1364837454.0000021FE6042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364864148.0000021FE6059000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
        Source: svchost.exe, 00000003.00000002.1364810207.0000021FE602B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
        Source: svchost.exe, 00000003.00000003.1364372767.0000021FE6058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1364864148.0000021FE6059000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
        Source: eF5TnJ6Frr.exe, 00000000.00000003.1223280972.0000000002081000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.exe, 00000000.00000003.1223217091.0000000002350000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.exe, 00000000.00000002.2465460091.0000000002081000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.tmp, 00000001.00000003.1224931810.0000000003130000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.tmp, 00000001.00000003.1224993868.0000000002258000.00000004.00001000.00020000.00000000.sdmp, eF5TnJ6Frr.tmp, 00000001.00000002.2465767756.000000000064E000.00000004.00000020.00020000.00000000.sdmp, eF5TnJ6Frr.tmp, 00000001.00000002.2466455866.0000000002258000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
        Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
        Source: unknownHTTPS traffic detected: 95.215.206.151:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 95.215.206.151:443 -> 192.168.2.4:49732 version: TLS 1.2

        System Summary

        barindex
        Source: defragtoolspro.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: DefragToolsPro.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0042F594 NtdllDefWindowProc_A,1_2_0042F594
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00479380 NtdllDefWindowProc_A,1_2_00479380
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045763C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045763C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00470C741_2_00470C74
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0043533C1_2_0043533C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004813C41_2_004813C4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004678481_2_00467848
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004303D01_2_004303D0
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0044453C1_2_0044453C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004885E01_2_004885E0
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004346381_2_00434638
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00444AE41_2_00444AE4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0048ED0C1_2_0048ED0C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00430F5C1_2_00430F5C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045F16C1_2_0045F16C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004451DC1_2_004451DC
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045B21C1_2_0045B21C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004455E81_2_004455E8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004876801_2_00487680
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0046989C1_2_0046989C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00451A301_2_00451A30
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0043DDC41_2_0043DDC4
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_004010002_2_00401000
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_004067B72_2_004067B7
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609660FA2_2_609660FA
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6092114F2_2_6092114F
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6091F2C92_2_6091F2C9
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096923E2_2_6096923E
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6093323D2_2_6093323D
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095C3142_2_6095C314
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609503122_2_60950312
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094D33B2_2_6094D33B
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6093B3682_2_6093B368
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096748C2_2_6096748C
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6093F42E2_2_6093F42E
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609544702_2_60954470
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609615FA2_2_609615FA
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096A5EE2_2_6096A5EE
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096D6A42_2_6096D6A4
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609606A82_2_609606A8
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609326542_2_60932654
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609556652_2_60955665
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094B7DB2_2_6094B7DB
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6092F74D2_2_6092F74D
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609648072_2_60964807
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094E9BC2_2_6094E9BC
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609379292_2_60937929
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6093FAD62_2_6093FAD6
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096DAE82_2_6096DAE8
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094DA3A2_2_6094DA3A
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60936B272_2_60936B27
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60954CF62_2_60954CF6
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60950C6B2_2_60950C6B
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60966DF12_2_60966DF1
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60963D352_2_60963D35
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60909E9C2_2_60909E9C
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60951E862_2_60951E86
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60912E0B2_2_60912E0B
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60954FF82_2_60954FF8
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CEBAED2_2_02CEBAED
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CF2A702_2_02CF2A70
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CED31F2_2_02CED31F
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CE70B02_2_02CE70B0
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CDE0712_2_02CDE071
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CF266D2_2_02CF266D
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CEBF052_2_02CEBF05
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CE873A2_2_02CE873A
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CEB5F92_2_02CEB5F9
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CF0DA42_2_02CF0DA4
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\DefragToolsPro\sqlite3.dll 16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\Qt5Concurrent.dll (copy) 32B0ACDF551507B4A8B9BD0467BEFDC2539C776E3F48221F0B577499F6EAE616
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00408C1C appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00406AD4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 0040596C appears 117 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00407904 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00403400 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00445E48 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00457FC4 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00457DB8 appears 102 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00434550 appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00403494 appears 85 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 004533B8 appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00446118 appears 58 times
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: String function: 00403684 appears 229 times
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: String function: 02CE7750 appears 32 times
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: String function: 02CF2A00 appears 136 times
        Source: eF5TnJ6Frr.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: eF5TnJ6Frr.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: eF5TnJ6Frr.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-NAA2F.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-NAA2F.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-NAA2F.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-MBT7C.tmp.1.drStatic PE information: Number of sections : 19 > 10
        Source: sqlite3.dll.2.drStatic PE information: Number of sections : 19 > 10
        Source: eF5TnJ6Frr.exe, 00000000.00000003.1223562867.0000000002350000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs eF5TnJ6Frr.exe
        Source: eF5TnJ6Frr.exe, 00000000.00000003.1223695253.0000000002088000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs eF5TnJ6Frr.exe
        Source: eF5TnJ6Frr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal100.troj.evad.winEXE@13/33@0/3
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CDF8C0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,2_2_02CDF8C0
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00455EB4 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455EB4
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,2_2_0040D474
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0046E5B8 GetVersion,CoCreateInstance,1_2_0046E5B8
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_004023BA StartServiceCtrlDispatcherA,lstrcmpiW,2_2_004023BA
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_004023BA StartServiceCtrlDispatcherA,lstrcmpiW,2_2_004023BA
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_00401B90 StartServiceCtrlDispatcherA,2_2_00401B90
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7464:120:WilError_03
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeFile created: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: defragtoolspro.exe, defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: defragtoolspro.exe, defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
        Source: defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: defragtoolspro.exe, defragtoolspro.exe, 00000002.00000002.2467969881.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, defragtoolspro.exe, 00000002.00000003.1244611693.000000000096F000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.2.dr, is-MBT7C.tmp.1.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
        Source: eF5TnJ6Frr.exeVirustotal: Detection: 25%
        Source: eF5TnJ6Frr.exeReversingLabs: Detection: 21%
        Source: eF5TnJ6Frr.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
        Source: eF5TnJ6Frr.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeFile read: C:\Users\user\Desktop\eF5TnJ6Frr.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\eF5TnJ6Frr.exe "C:\Users\user\Desktop\eF5TnJ6Frr.exe"
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeProcess created: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmp "C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmp" /SL5="$204A2,3382697,56832,C:\Users\user\Desktop\eF5TnJ6Frr.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe "C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe" -i
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
        Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeProcess created: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmp "C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmp" /SL5="$204A2,3382697,56832,C:\Users\user\Desktop\eF5TnJ6Frr.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe "C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe" -iJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: sqlite3.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Defrag Tools Pro_is1Jump to behavior
        Source: eF5TnJ6Frr.exeStatic file information: File size 3633422 > 1048576
        Source: eF5TnJ6Frr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: msvcp100.i386.pdb source: is-J59BF.tmp.1.dr
        Source: Binary string: msvcr100.i386.pdb source: is-5NBFO.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeUnpacked PE file: 2.2.defragtoolspro.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeUnpacked PE file: 2.2.defragtoolspro.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /4
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /19
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /35
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /51
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /63
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /77
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /89
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /102
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /113
        Source: is-MBT7C.tmp.1.drStatic PE information: section name: /124
        Source: sqlite3.dll.2.drStatic PE information: section name: /4
        Source: sqlite3.dll.2.drStatic PE information: section name: /19
        Source: sqlite3.dll.2.drStatic PE information: section name: /35
        Source: sqlite3.dll.2.drStatic PE information: section name: /51
        Source: sqlite3.dll.2.drStatic PE information: section name: /63
        Source: sqlite3.dll.2.drStatic PE information: section name: /77
        Source: sqlite3.dll.2.drStatic PE information: section name: /89
        Source: sqlite3.dll.2.drStatic PE information: section name: /102
        Source: sqlite3.dll.2.drStatic PE information: section name: /113
        Source: sqlite3.dll.2.drStatic PE information: section name: /124
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004849F4 push 00484B02h; ret 1_2_00484AFA
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0040995C push 00409999h; ret 1_2_00409991
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00458060 push 00458098h; ret 1_2_00458090
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004860E4 push ecx; mov dword ptr [esp], ecx1_2_004860E9
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004783C8 push ecx; mov dword ptr [esp], edx1_2_004783C9
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004104F0 push ecx; mov dword ptr [esp], edx1_2_004104F5
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0049AD44 pushad ; retf 1_2_0049AD53
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0040CE48 push ecx; mov dword ptr [esp], edx1_2_0040CE4A
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00459378 push 004593BCh; ret 1_2_004593B4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0040F3A8 push ecx; mov dword ptr [esp], edx1_2_0040F3AA
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004434B4 push ecx; mov dword ptr [esp], ecx1_2_004434B8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0045186C push 0045189Fh; ret 1_2_00451897
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00451A30 push ecx; mov dword ptr [esp], eax1_2_00451A35
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00495BE4 push ecx; mov dword ptr [esp], ecx1_2_00495BE9
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00419C38 push ecx; mov dword ptr [esp], ecx1_2_00419C3D
        Source: is-5NBFO.tmp.1.drStatic PE information: section name: .text entropy: 6.90903234258047

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02CDE89A
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-O4E0F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-5LK4E.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-J59BF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-1K3IJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\libGLESv2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\icuuc51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-MBT7C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Temp\is-H295N.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-IP43T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\Qt5PrintSupport.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-Q018O.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeFile created: C:\ProgramData\DefragToolsPro\sqlite3.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\icuin51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeFile created: C:\ProgramData\DefragToolsPro\DefragToolsPro.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Temp\is-H295N.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeFile created: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\Qt5Concurrent.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\sqlite3.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Temp\is-H295N.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\uninstall\is-NAA2F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\msvcp100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\libEGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-8QM7V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\msvcr100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpFile created: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-5NBFO.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeFile created: C:\ProgramData\DefragToolsPro\DefragToolsPro.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeFile created: C:\ProgramData\DefragToolsPro\sqlite3.dllJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02CDE89A
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_004023BA StartServiceCtrlDispatcherA,lstrcmpiW,2_2_004023BA
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004843A8 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004843A8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0042F2F0 IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F2F0
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02CDE99E
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeWindow / User API: threadDelayed 2120Jump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeWindow / User API: threadDelayed 7834Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-O4E0F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-H295N.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-5LK4E.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-J59BF.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\Qt5Concurrent.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-1K3IJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\libGLESv2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-H295N.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\icuuc51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\uninstall\is-NAA2F.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\msvcp100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-IP43T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-H295N.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-MBT7C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\libEGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\Qt5PrintSupport.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-Q018O.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-8QM7V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\msvcr100.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\is-5NBFO.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\icuin51.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5967
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-61440
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeAPI coverage: 4.8 %
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe TID: 6928Thread sleep count: 2120 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe TID: 6928Thread sleep time: -4240000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe TID: 7880Thread sleep time: -180000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe TID: 6928Thread sleep count: 7834 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exe TID: 6928Thread sleep time: -15668000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_004023DD GetLocalTime followed by cmp: cmp dword ptr [ebp-0000011ch], 01h and CTI: jbe 00401B90h2_2_004023DD
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00475798 FindFirstFileA,FindNextFileA,FindClose,1_2_00475798
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0046417C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0046417C
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_004645F8 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004645F8
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00462BF0 FindFirstFileA,FindNextFileA,FindClose,1_2_00462BF0
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00498FDC FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00498FDC
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeThread delayed: delay time: 60000Jump to behavior
        Source: svchost.exe, 00000006.00000002.2465691141.0000022F8944B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000006.00000002.2465561463.0000022F8942B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000006.00000002.2465561463.0000022F8942B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
        Source: svchost.exe, 00000006.00000002.2465691141.0000022F8944B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: defragtoolspro.exe, 00000002.00000002.2465600216.0000000000A45000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000002.2465600216.0000000000958000.00000004.00000020.00020000.00000000.sdmp, defragtoolspro.exe, 00000002.00000003.2098168723.0000000000A45000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: svchost.exe, 00000006.00000002.2465331999.0000022F89402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
        Source: svchost.exe, 00000006.00000002.2466072634.0000022F89502000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000006.00000002.2465691141.0000022F8944B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: svchost.exe, 00000006.00000002.2465862847.0000022F89464000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeAPI call chain: ExitProcess graph end nodegraph_0-6764
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeAPI call chain: ExitProcess graph end nodegraph_2-61159
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_2-61336
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CE80F0 IsDebuggerPresent,2_2_02CE80F0
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CEE6AE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02CEE6AE
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CD5E41 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02CD5E41
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CE80DA SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02CE80DA
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00478DC4 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478DC4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0042EE28 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042EE28
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_02CDE852 cpuid 2_2_02CDE852
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: GetLocaleInfoA,0_2_0040520C
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: GetLocaleInfoA,0_2_00405258
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: GetLocaleInfoA,1_2_00408578
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: GetLocaleInfoA,1_2_004085C4
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00458670 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458670
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-OE1VH.tmp\eF5TnJ6Frr.tmpCode function: 1_2_00455644 GetUserNameA,1_2_00455644
        Source: C:\Users\user\Desktop\eF5TnJ6Frr.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
        Source: svchost.exe, 00000007.00000002.2466606917.00000210B7702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
        Source: svchost.exe, 00000007.00000002.2466606917.00000210B7702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2467069280.0000000002CD1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2466991985.0000000002C2E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: defragtoolspro.exe PID: 8188, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2467069280.0000000002CD1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2466991985.0000000002C2E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: defragtoolspro.exe PID: 8188, type: MEMORYSTR
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,2_2_609660FA
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,2_2_6090C1D6
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,2_2_60963143
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_6096A2BD
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,2_2_6096923E
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,2_2_6096A38C
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,2_2_6096748C
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,2_2_609254B1
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_6094B407
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6090F435 sqlite3_bind_parameter_index,2_2_6090F435
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,2_2_609255D4
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609255FF sqlite3_bind_text,2_2_609255FF
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,2_2_6096A5EE
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,2_2_6094B54C
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,2_2_60925686
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,2_2_6094A6C5
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,2_2_609256E5
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,2_2_6094B6ED
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6092562A sqlite3_bind_blob,2_2_6092562A
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,2_2_60925655
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_6094C64A
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,2_2_609687A7
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_6095F7F7
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,2_2_6092570B
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095F772
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,2_2_60925778
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6090577D sqlite3_bind_parameter_name,2_2_6090577D
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,2_2_6094B764
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6090576B sqlite3_bind_parameter_count,2_2_6090576B
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,2_2_6094A894
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095F883
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,2_2_6094C8C2
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,2_2_6096281E
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,2_2_6096583A
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,2_2_6095F9AD
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6094A92B
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6090EAE5 sqlite3_transfer_bindings,2_2_6090EAE5
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,2_2_6095FB98
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,2_2_6095ECA6
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_6095FCCE
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_6095FDAE
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,2_2_60966DF1
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_60969D75
        Source: C:\Users\user\AppData\Local\Defrag Tools Pro 11.3.1.910\defragtoolspro.exeCode function: 2_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,2_2_6095FFB2
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Disable or Modify Tools
        OS Credential Dumping11
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts3
        Native API
        5
        Windows Service
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Command and Scripting Interpreter
        1
        Bootkit
        1
        Access Token Manipulation
        3
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts2
        Service Execution
        Login Hook5
        Windows Service
        21
        Software Packing
        NTDS46
        System Information Discovery
        Distributed Component Object ModelInput Capture1
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets271
        Security Software Discovery
        SSHKeylogging12
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
        Virtualization/Sandbox Evasion
        DCSync131
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        System Network Configuration Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1633095 Sample: eF5TnJ6Frr.exe Startdate: 09/03/2025 Architecture: WINDOWS Score: 100 48 Antivirus detection for URL or domain 2->48 50 Antivirus detection for dropped file 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 8 other signatures 2->54 7 eF5TnJ6Frr.exe 2 2->7         started        10 svchost.exe 2->10         started        13 svchost.exe 2->13         started        15 3 other processes 2->15 process3 file4 36 C:\Users\user\AppData\...\eF5TnJ6Frr.tmp, PE32 7->36 dropped 17 eF5TnJ6Frr.tmp 18 26 7->17         started        56 Changes security center settings (notifications, updates, antivirus, firewall) 10->56 20 MpCmdRun.exe 1 10->20         started        signatures5 process6 file7 28 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 17->28 dropped 30 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 17->30 dropped 32 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 17->32 dropped 34 21 other malicious files 17->34 dropped 22 defragtoolspro.exe 1 21 17->22         started        26 conhost.exe 20->26         started        process8 dnsIp9 42 176.113.115.96, 443, 49721, 49723 SELECTELRU Russian Federation 22->42 44 95.215.206.151, 443, 49731, 49732 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 22->44 46 45.93.20.230, 2024, 49733 COGENT-174US Netherlands 22->46 38 C:\ProgramData\DefragToolsPro\sqlite3.dll, PE32 22->38 dropped 40 C:\ProgramData\...\DefragToolsPro.exe, PE32 22->40 dropped file10

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.