Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aura.exe

Overview

General Information

Sample name:Aura.exe
Analysis ID:1635429
MD5:bcfc6d6a511252168841ec1ecc958dd6
SHA1:1d517629c8994f87aff924862c2f99ca1dfc433a
SHA256:805b842a22a72b58a7932a54da75bcf703dbec25d25bf0dccf853c860666fcea
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Aura.exe (PID: 8488 cmdline: "C:\Users\user\Desktop\Aura.exe" MD5: BCFC6D6A511252168841EC1ECC958DD6)
    • conhost.exe (PID: 8496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Aura.exe (PID: 8548 cmdline: "C:\Users\user\Desktop\Aura.exe" MD5: BCFC6D6A511252168841EC1ECC958DD6)
    • Aura.exe (PID: 8556 cmdline: "C:\Users\user\Desktop\Aura.exe" MD5: BCFC6D6A511252168841EC1ECC958DD6)
    • WerFault.exe (PID: 8648 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8488 -s 400 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000003.1484274331.0000000001327000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.2578327207.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      00000003.00000003.1425991879.0000000001383000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.1484126690.0000000001327000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.1483876553.0000000001327000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            3.2.Aura.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              3.2.Aura.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-11T17:10:12.781362+010020283713Unknown Traffic192.168.2.549706149.154.167.99443TCP
                2025-03-11T17:10:15.037924+010020283713Unknown Traffic192.168.2.549708104.21.93.43443TCP
                2025-03-11T17:10:16.744887+010020283713Unknown Traffic192.168.2.549710104.21.16.1443TCP
                2025-03-11T17:10:19.476810+010020283713Unknown Traffic192.168.2.549711104.21.16.1443TCP
                2025-03-11T17:10:22.141023+010020283713Unknown Traffic192.168.2.549712104.21.16.1443TCP
                2025-03-11T17:10:24.892669+010020283713Unknown Traffic192.168.2.549713104.21.16.1443TCP
                2025-03-11T17:10:28.142209+010020283713Unknown Traffic192.168.2.549714104.21.16.1443TCP
                2025-03-11T17:10:31.407366+010020283713Unknown Traffic192.168.2.549716104.21.16.1443TCP
                2025-03-11T17:10:35.037987+010020283713Unknown Traffic192.168.2.549719104.21.16.1443TCP
                2025-03-11T17:10:36.669576+010020283713Unknown Traffic192.168.2.549721188.114.97.3443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://jowinjoinery.icu/Avira URL Cloud: Label: malware
                Source: https://jowinjoinery.icu/PAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top:443/aNzSAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top:443/aNzShv.default-release/key4.dbPKAvira URL Cloud: Label: malware
                Source: https://astralconnec.icu/DPowkoAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/8Avira URL Cloud: Label: malware
                Source: https://mrodularmall.top/P=C:Avira URL Cloud: Label: malware
                Source: https://mrodularmall.top:443/aNzSMicrosoftAvira URL Cloud: Label: malware
                Source: https://jowinjoinery.icu/bdWUaAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/aNzSyAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/SbAvira URL Cloud: Label: malware
                Source: https://jowinjoinery.icu/cbAvira URL Cloud: Label: malware
                Source: https://featureccus.shop/lAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/aAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/aNzSAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/p#bAvira URL Cloud: Label: malware
                Source: https://jowinjoinery.icu:443/bdWUaicrosoftAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/YAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/aNzSimAvira URL Cloud: Label: malware
                Source: https://featureccus.shop/bdMAnMAvira URL Cloud: Label: malware
                Source: https://mrodularmall.top/Avira URL Cloud: Label: malware
                Source: Aura.exeVirustotal: Detection: 41%Perma Link
                Source: Aura.exeReversingLabs: Detection: 36%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.0% probability
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: astralconnec.icu/DPowko
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: featureccus.shop/bdMAn
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: mrodularmall.top/aNzS
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: jowinjoinery.icu/bdWUa
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: legenassedk.top/bdpWO
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: htardwarehu.icu/Sbdsa
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: cjlaspcorne.icu/DbIps
                Source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpString decryptor: bugildbett.top/bAuz
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041D1C2 CryptUnprotectData,3_2_0041D1C2
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041EECC CryptUnprotectData,CryptUnprotectData,3_2_0041EECC
                Source: Aura.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49706 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49712 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49714 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49721 version: TLS 1.2
                Source: Aura.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ACF86F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00ACF86F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ACF7BE FindFirstFileExW,0_2_00ACF7BE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ACF86F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00ACF86F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ACF7BE FindFirstFileExW,2_2_00ACF7BE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx+10E8C126h]3_2_00411040
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov ecx, edi3_2_0042C080
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [ecx], bl3_2_00411640
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov eax, dword ptr [esp+58h]3_2_0040E82F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h3_2_0044D990
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CA198B66h3_2_0042FA30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-7FFFFFFFh]3_2_0042FA30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx eax, di3_2_0042FA30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+4E5AD110h]3_2_0040DAC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_00436C8E
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_00436D60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then push eax3_2_0040ED7F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-7FC4FC76h]3_2_00421EF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 64DAE379h3_2_00421EF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-7FC4FC82h]3_2_00421EF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 6D58C181h3_2_00421EF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_004380AC
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_004371CF
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_0040A340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_0040A340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 7A542AABh3_2_0044E340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-2Eh]3_2_0043137E
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-2Eh]3_2_0043137E
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+04h]3_2_0043238F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00442440
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0043644C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041D4F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h3_2_00429490
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h3_2_00429490
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-1530D448h]3_2_00421510
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+08h]3_2_00421510
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax+013A68D0h]3_2_00433587
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0043658C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_00436598
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edi+ecx*8], 744E5843h3_2_00449650
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+0Ch]3_2_00413670
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax+013A68D0h]3_2_0043360A
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h3_2_0043163A
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041D6D2
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_0040C6F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 3FDB1228h3_2_00412723
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-7FCB06BCh]3_2_004327D4
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041D782
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041D842
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-7FC4FC82h]3_2_00446850
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edi+6A51526Ah]3_2_004278F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_004369B3
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+08BE7850h]3_2_0044AA44
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov edx, ecx3_2_00433A4B
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx]3_2_0044EA50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-3ECF6056h]3_2_00425A00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_00425A00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov word ptr [edi], cx3_2_00429A30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov ebp, eax3_2_00408AC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov word ptr [ebx], cx3_2_0042EA80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h3_2_0041EB48
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov dword ptr [esi+0Ch], ecx3_2_00420B1E
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041BBD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0Ch]3_2_00449BA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DBBC
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then jmp ecx3_2_00423C80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then jmp ecx3_2_00423C95
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [esp], 00000000h3_2_00446D51
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h3_2_0041ED5D
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax+00h]3_2_0040CE40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DE36
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_00436E39
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx eax, byte ptr [ebp+ecx-14h]3_2_00445EC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00433EE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DEF1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DEF1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DEF1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DEF1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then add edi, ecx3_2_0042EE93
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h3_2_00428EA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov edx, dword ptr [esp+44h]3_2_00424F20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov edx, dword ptr [esp+44h]3_2_00424F29
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 743EDB10h3_2_0044DFD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-7FC4FC7Ah]3_2_0041DFE9
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_00437FFD
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]3_2_00446F87
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx ecx, word ptr [ebp+eax+00h]3_2_00446F87
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+12h]3_2_00446F87
                Source: C:\Users\user\Desktop\Aura.exeCode function: 4x nop then mov byte ptr [esi], al3_2_00437F89
                Source: global trafficHTTP traffic detected: GET /asdawfq HTTP/1.1Connection: Keep-AliveHost: t.me
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.93.43:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49714 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49712 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49713 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 149.154.167.99:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49716 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49719 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49721 -> 188.114.97.3:443
                Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: mrodularmall.top
                Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7vP4BfyfrN0or9012ZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14937Host: mrodularmall.top
                Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=f63DJ0o3bvUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15046Host: mrodularmall.top
                Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=cADwnI12Hp3p50User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20555Host: mrodularmall.top
                Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4bm06xfoQd5zb8kw9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2693Host: mrodularmall.top
                Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=pQ772M74MUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569474Host: mrodularmall.top
                Source: global trafficHTTP traffic detected: POST /bdWUa HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 103Host: jowinjoinery.icu
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /asdawfq HTTP/1.1Connection: Keep-AliveHost: t.me
                Source: global trafficDNS traffic detected: DNS query: t.me
                Source: global trafficDNS traffic detected: DNS query: astralconnec.icu
                Source: global trafficDNS traffic detected: DNS query: featureccus.shop
                Source: global trafficDNS traffic detected: DNS query: mrodularmall.top
                Source: global trafficDNS traffic detected: DNS query: jowinjoinery.icu
                Source: unknownHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: mrodularmall.top
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://astralconnec.icu/DPowko
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://featureccus.shop/bdMAnM
                Source: Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://featureccus.shop/l
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: Aura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/
                Source: Aura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/P
                Source: Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/bdWUa
                Source: Aura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu/cb
                Source: Aura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://jowinjoinery.icu:443/bdWUaicrosoft
                Source: Aura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1509261866.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1534242372.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/
                Source: Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/8
                Source: Aura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/P=C:
                Source: Aura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/Sb
                Source: Aura.exe, 00000003.00000003.1509261866.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/Y
                Source: Aura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/a
                Source: Aura.exe, 00000003.00000003.1534242372.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/aNzS
                Source: Aura.exe, 00000003.00000003.1555362408.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1555401145.00000000013B5000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1534242372.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/aNzSim
                Source: Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/aNzSy
                Source: Aura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/p#b
                Source: Aura.exe, 00000003.00000003.1449006745.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1425124973.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1423142277.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1508869079.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1424052324.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1477825528.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1395874766.0000000001303000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1424492990.00000000038F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top:443/aNzS
                Source: Aura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top:443/aNzSMicrosoft
                Source: Aura.exe, 00000003.00000003.1508869079.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1477825528.00000000038F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top:443/aNzShv.default-release/key4.dbPK
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Aura.exe, 00000003.00000003.1353557204.000000000133B000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353634903.0000000001303000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1395874766.0000000001303000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
                Source: Aura.exe, 00000003.00000003.1353519964.0000000001371000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2578727115.00000000012D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/asdawfq
                Source: Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
                Source: Aura.exe, 00000003.00000003.1353712898.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353557204.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.orgPersistent-AuthWWW-AuthenticateVarystel_ssid=534dbfa6f9df898e79_173770952914
                Source: Aura.exe, 00000003.00000003.1353712898.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353557204.0000000001327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.orgX-Frame-OptionsALLOW-FROM
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: Aura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49706 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49712 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49714 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49721 version: TLS 1.2
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00440070 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,3_2_00440070
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_03721000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,3_2_03721000
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00440070 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,3_2_00440070
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00440220 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,3_2_00440220
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A54D600_2_00A54D60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A91EE00_2_00A91EE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A926F00_2_00A926F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5C0A00_2_00A5C0A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A858A00_2_00A858A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A868A00_2_00A868A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA28A00_2_00AA28A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB78A00_2_00AB78A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6D8E00_2_00A6D8E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A898F00_2_00A898F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A918F00_2_00A918F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB88F00_2_00AB88F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6E0D00_2_00A6E0D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAD0D00_2_00AAD0D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A680200_2_00A68020
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A780200_2_00A78020
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA90300_2_00AA9030
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A648100_2_00A64810
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8A8160_2_00A8A816
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A598600_2_00A59860
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5D8700_2_00A5D870
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6D0700_2_00A6D070
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A600700_2_00A60070
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAA0730_2_00AAA073
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AD50720_2_00AD5072
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8E0500_2_00A8E050
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAA1BB0_2_00AAA1BB
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A679800_2_00A67980
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5E9E00_2_00A5E9E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA59E00_2_00AA59E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AD31F80_2_00AD31F8
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAD9C00_2_00AAD9C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABA9C00_2_00ABA9C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7F9200_2_00A7F920
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A651300_2_00A65130
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A851300_2_00A85130
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5C90C0_2_00A5C90C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A9C9100_2_00A9C910
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A561190_2_00A56119
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A771600_2_00A77160
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8D1600_2_00A8D160
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A629400_2_00A62940
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A901400_2_00A90140
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8C1500_2_00A8C150
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A59AA00_2_00A59AA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB92A00_2_00AB92A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7EAB00_2_00A7EAB0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7D2B00_2_00A7D2B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A9C2B00_2_00A9C2B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB62B00_2_00AB62B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A572800_2_00A57280
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB4A800_2_00AB4A80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A882900_2_00A88290
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAC2900_2_00AAC290
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6F2F00_2_00A6F2F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6A2F00_2_00A6A2F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7A2F00_2_00A7A2F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A84AF00_2_00A84AF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A76A200_2_00A76A20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A9EA200_2_00A9EA20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A60A100_2_00A60A10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A70A100_2_00A70A10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB0A100_2_00AB0A10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6FA400_2_00A6FA40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A74A400_2_00A74A40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A872400_2_00A87240
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5AA4A0_2_00A5AA4A
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A672500_2_00A67250
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A72BA00_2_00A72BA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A9D3A00_2_00A9D3A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA93B90_2_00AA93B9
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A58BB00_2_00A58BB0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAD3B00_2_00AAD3B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A623800_2_00A62380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A703800_2_00A70380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7C3800_2_00A7C380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8FB800_2_00A8FB80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAB3800_2_00AAB380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB5B800_2_00AB5B80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABA39F0_2_00ABA39F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABD3E80_2_00ABD3E8
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A793D00_2_00A793D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A85BD00_2_00A85BD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A57B210_2_00A57B21
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A63B200_2_00A63B20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7FB300_2_00A7FB30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A713300_2_00A71330
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A94B000_2_00A94B00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6EB100_2_00A6EB10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7E3100_2_00A7E310
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A853600_2_00A85360
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB03600_2_00AB0360
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6D3400_2_00A6D340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A75B400_2_00A75B40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A823500_2_00A82350
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A93B500_2_00A93B50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA43500_2_00AA4350
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5FCA00_2_00A5FCA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A804A00_2_00A804A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A904B00_2_00A904B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAACB00_2_00AAACB0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAE4800_2_00AAE480
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB24800_2_00AB2480
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA8C900_2_00AA8C90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA94EB0_2_00AA94EB
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6CCE00_2_00A6CCE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A734E00_2_00A734E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A834E00_2_00A834E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A61CF00_2_00A61CF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A84CF00_2_00A84CF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A94CF00_2_00A94CF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA04F00_2_00AA04F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A81CC00_2_00A81CC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA6CC40_2_00AA6CC4
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8BC200_2_00A8BC20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A844300_2_00A84430
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A644000_2_00A64400
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA9C000_2_00AA9C00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A96C100_2_00A96C10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7CC700_2_00A7CC70
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A89C700_2_00A89C70
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5C44A0_2_00A5C44A
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A69DA00_2_00A69DA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AC1DAA0_2_00AC1DAA
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A575B00_2_00A575B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA6D8B0_2_00AA6D8B
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7DD900_2_00A7DD90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A705900_2_00A70590
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABA5900_2_00ABA590
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A62DE00_2_00A62DE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA5DE00_2_00AA5DE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB85E00_2_00AB85E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A585F00_2_00A585F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5E5C00_2_00A5E5C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A625300_2_00A62530
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AC7D100_2_00AC7D10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A665600_2_00A66560
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5BD400_2_00A5BD40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A745400_2_00A74540
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB7D400_2_00AB7D40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A76D500_2_00A76D50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5A55B0_2_00A5A55B
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7EE800_2_00A7EE80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA2E800_2_00AA2E80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A56E900_2_00A56E90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7FE900_2_00A7FE90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB3E900_2_00AB3E90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5CEE00_2_00A5CEE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A536F00_2_00A536F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A83ED00_2_00A83ED0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A75E200_2_00A75E20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A876300_2_00A87630
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A87E300_2_00A87E30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB46300_2_00AB4630
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A57E000_2_00A57E00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A606000_2_00A60600
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7C6000_2_00A7C600
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A73E000_2_00A73E00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB4E680_2_00AB4E68
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A85E700_2_00A85E70
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA8E400_2_00AA8E40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB06400_2_00AB0640
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A9A6500_2_00A9A650
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA9FAB0_2_00AA9FAB
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8A7A00_2_00A8A7A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA87A00_2_00AA87A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAA7A00_2_00AAA7A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A657B00_2_00A657B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAB7B00_2_00AAB7B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A61F800_2_00A61F80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AB97800_2_00AB9780
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7A7900_2_00A7A790
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A797E00_2_00A797E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A7CFE00_2_00A7CFE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA37E00_2_00AA37E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6FFC00_2_00A6FFC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A87FC00_2_00A87FC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A547D00_2_00A547D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6F7D00_2_00A6F7D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A73FD00_2_00A73FD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A937200_2_00A93720
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A6C7300_2_00A6C730
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8E7300_2_00A8E730
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA47300_2_00AA4730
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA57000_2_00AA5700
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5AF100_2_00A5AF10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A57F100_2_00A57F10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A82F100_2_00A82F10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A8B7100_2_00A8B710
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A95F100_2_00A95F10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA3F600_2_00AA3F60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A747700_2_00A74770
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAE7700_2_00AAE770
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AA9F4C0_2_00AA9F4C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00A5F7500_2_00A5F750
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAF7500_2_00AAF750
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AAFF500_2_00AAFF50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5C0A02_2_00A5C0A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A560A02_2_00A560A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A858A02_2_00A858A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A868A02_2_00A868A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA28A02_2_00AA28A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB78A02_2_00AB78A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6D8E02_2_00A6D8E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A898F02_2_00A898F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A918F02_2_00A918F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB88F02_2_00AB88F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6E0D02_2_00A6E0D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAD0D02_2_00AAD0D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A680202_2_00A68020
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A780202_2_00A78020
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA90302_2_00AA9030
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A648102_2_00A64810
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8A8162_2_00A8A816
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A598602_2_00A59860
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5D8702_2_00A5D870
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6D0702_2_00A6D070
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A600702_2_00A60070
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AD50722_2_00AD5072
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8E0502_2_00A8E050
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A679802_2_00A67980
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A921952_2_00A92195
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5E9E02_2_00A5E9E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA59E02_2_00AA59E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AD31F82_2_00AD31F8
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAD9C02_2_00AAD9C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABA9C02_2_00ABA9C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A651302_2_00A65130
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A851302_2_00A85130
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A9C9102_2_00A9C910
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A771602_2_00A77160
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8D1602_2_00A8D160
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A629402_2_00A62940
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A901402_2_00A90140
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8C1502_2_00A8C150
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A59AA02_2_00A59AA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7EAB12_2_00A7EAB1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7D2B02_2_00A7D2B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A9C2B02_2_00A9C2B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A57A802_2_00A57A80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A572802_2_00A57280
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB4A802_2_00AB4A80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A882902_2_00A88290
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAC2902_2_00AAC290
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6F2F02_2_00A6F2F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6A2F02_2_00A6A2F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7A2F02_2_00A7A2F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A84AF02_2_00A84AF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A76A202_2_00A76A20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A9EA202_2_00A9EA20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A60A102_2_00A60A10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A70A102_2_00A70A10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB0A102_2_00AB0A10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA72602_2_00AA7260
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6FA402_2_00A6FA40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A74A402_2_00A74A40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A872402_2_00A87240
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A672502_2_00A67250
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A72BA02_2_00A72BA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A9D3A02_2_00A9D3A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A58BB02_2_00A58BB0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5C3B02_2_00A5C3B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAD3B02_2_00AAD3B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A623802_2_00A62380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7C3802_2_00A7C380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A703802_2_00A70380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8FB802_2_00A8FB80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAB3802_2_00AAB380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB5B802_2_00AB5B80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABD3E82_2_00ABD3E8
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5ABC02_2_00A5ABC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A793D02_2_00A793D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A85BD02_2_00A85BD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A63B202_2_00A63B20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A713302_2_00A71330
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7FB302_2_00A7FB30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA93302_2_00AA9330
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A94B002_2_00A94B00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABA3002_2_00ABA300
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6EB102_2_00A6EB10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A853602_2_00A85360
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB03602_2_00AB0360
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6D3402_2_00A6D340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A75B402_2_00A75B40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A823502_2_00A82350
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A93B502_2_00A93B50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA43502_2_00AA4350
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5FCA02_2_00A5FCA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A904B02_2_00A904B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAACB02_2_00AAACB0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAE4802_2_00AAE480
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB24802_2_00AB2480
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA8C902_2_00AA8C90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6CCE02_2_00A6CCE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A734E02_2_00A734E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A834E02_2_00A834E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5A4F02_2_00A5A4F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A61CF02_2_00A61CF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A94CF02_2_00A94CF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA04F02_2_00AA04F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A81CC02_2_00A81CC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8BC202_2_00A8BC20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA6C202_2_00AA6C20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A844302_2_00A84430
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A644002_2_00A64400
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA9C002_2_00AA9C00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A96C102_2_00A96C10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A89C702_2_00A89C70
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A69DA02_2_00A69DA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AC1DAA2_2_00AC1DAA
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A575B02_2_00A575B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A705902_2_00A70590
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABA5902_2_00ABA590
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A62DE02_2_00A62DE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA5DE02_2_00AA5DE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB85E02_2_00AB85E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A585F02_2_00A585F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5E5C02_2_00A5E5C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A625302_2_00A62530
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AC7D102_2_00AC7D10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A54D602_2_00A54D60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A665602_2_00A66560
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5BD402_2_00A5BD40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A745402_2_00A74540
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB7D402_2_00AB7D40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A76D502_2_00A76D50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7EE812_2_00A7EE81
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA2E802_2_00AA2E80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A56E902_2_00A56E90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB3E902_2_00AB3E90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5CEE02_2_00A5CEE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A536F02_2_00A536F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A926F02_2_00A926F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A83ED02_2_00A83ED0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A75E202_2_00A75E20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A876302_2_00A87630
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A87E302_2_00A87E30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB46302_2_00AB4630
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A57E002_2_00A57E00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A606002_2_00A60600
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7C6002_2_00A7C600
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A73E002_2_00A73E00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB4E682_2_00AB4E68
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A85E702_2_00A85E70
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA8E402_2_00AA8E40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AB06402_2_00AB0640
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A9A6502_2_00A9A650
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8A7A02_2_00A8A7A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA87A02_2_00AA87A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAA7A02_2_00AAA7A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A657B02_2_00A657B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAB7B02_2_00AAB7B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A61F802_2_00A61F80
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7A7902_2_00A7A790
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A7CFE02_2_00A7CFE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A797E02_2_00A797E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA37E02_2_00AA37E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6FFC02_2_00A6FFC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A87FC02_2_00A87FC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A547D02_2_00A547D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6F7D02_2_00A6F7D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A73FD02_2_00A73FD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A937202_2_00A93720
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A6C7302_2_00A6C730
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8E7302_2_00A8E730
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA47302_2_00AA4730
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA9F002_2_00AA9F00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA57002_2_00AA5700
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5AF102_2_00A5AF10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A57F102_2_00A57F10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A8B7102_2_00A8B710
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A95F102_2_00A95F10
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AA3F602_2_00AA3F60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A747702_2_00A74770
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAE7702_2_00AAE770
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00A5F7502_2_00A5F750
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAF7502_2_00AAF750
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AAFF502_2_00AAFF50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0042C0803_2_0042C080
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044F1D03_2_0044F1D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004452C03_2_004452C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004285703_2_00428570
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004375EB3_2_004375EB
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044E6D03_2_0044E6D0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040E82F3_2_0040E82F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041695B3_2_0041695B
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0042FA303_2_0042FA30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044DAC03_2_0044DAC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040BB903_2_0040BB90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044EC203_2_0044EC20
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00436D603_2_00436D60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041EECC3_2_0041EECC
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00444EE03_2_00444EE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00421EF03_2_00421EF0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00448F303_2_00448F30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004010403_2_00401040
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044D0503_2_0044D050
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004300203_2_00430020
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044D0F03_2_0044D0F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043E0923_2_0043E092
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004210943_2_00421094
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043C10C3_2_0043C10C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004101B03_2_004101B0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004462403_2_00446240
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004262203_2_00426220
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004302C13_2_004302C1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043B2DE3_2_0043B2DE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004242E03_2_004242E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040A3403_2_0040A340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044E3403_2_0044E340
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040C3603_2_0040C360
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044D3803_2_0044D380
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043238F3_2_0043238F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043644C3_2_0043644C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043E4EB3_2_0043E4EB
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040F4FC3_2_0040F4FC
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004444803_2_00444480
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004294903_2_00429490
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040D5403_2_0040D540
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004035603_2_00403560
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004095603_2_00409560
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004215103_2_00421510
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004335203_2_00433520
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044D5803_2_0044D580
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004136703_2_00413670
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043D6D23_2_0043D6D2
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004446E03_2_004446E0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041F6E93_2_0041F6E9
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040C6F03_2_0040C6F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041F68B3_2_0041F68B
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004176B33_2_004176B3
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004107003_2_00410700
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043D7123_2_0043D712
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004047E23_2_004047E2
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004027A03_2_004027A0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004388093_2_00438809
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004278F03_2_004278F0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043C9053_2_0043C905
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004319343_2_00431934
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044AA443_2_0044AA44
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00425A003_2_00425A00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00408AC03_2_00408AC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043FAE03_2_0043FAE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041EB483_2_0041EB48
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00402B503_2_00402B50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043EBE73_2_0043EBE7
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00449BA03_2_00449BA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00431C503_2_00431C50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00424C003_2_00424C00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00430CC83_2_00430CC8
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00442CE43_2_00442CE4
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044ACF43_2_0044ACF4
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043ACFB3_2_0043ACFB
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041BC903_2_0041BC90
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040FCA03_2_0040FCA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040AD403_2_0040AD40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041CD4F3_2_0041CD4F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044CD603_2_0044CD60
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0042CD113_2_0042CD11
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043FDC03_2_0043FDC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00407DD03_2_00407DD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0040CE403_2_0040CE40
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044CE503_2_0044CE50
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00443E2E3_2_00443E2E
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0042EE303_2_0042EE30
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00411E3A3_2_00411E3A
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00445EC03_2_00445EC0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043CEE03_2_0043CEE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0041DEF13_2_0041DEF1
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00428EA03_2_00428EA0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00403F003_2_00403F00
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00424F293_2_00424F29
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044DFD03_2_0044DFD0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00408FE03_2_00408FE0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00437FFD3_2_00437FFD
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00446F873_2_00446F87
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0042AF8B3_2_0042AF8B
                Source: C:\Users\user\Desktop\Aura.exeCode function: String function: 0041BC80 appears 102 times
                Source: C:\Users\user\Desktop\Aura.exeCode function: String function: 00ACA904 appears 32 times
                Source: C:\Users\user\Desktop\Aura.exeCode function: String function: 00AC5B5C appears 38 times
                Source: C:\Users\user\Desktop\Aura.exeCode function: String function: 00ABD8F0 appears 88 times
                Source: C:\Users\user\Desktop\Aura.exeCode function: String function: 0040B360 appears 49 times
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8488 -s 400
                Source: Aura.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Aura.exeStatic PE information: Section: .bss ZLIB complexity 1.0003291478064067
                Source: Aura.exeStatic PE information: Section: .bss ZLIB complexity 1.0003291478064067
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@5/4
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_004452C0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_004452C0
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8496:120:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8488
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\cdc5e494-92eb-4e77-9e4a-a1290d46e312Jump to behavior
                Source: Aura.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Aura.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Aura.exe, 00000003.00000003.1397004528.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1424329710.00000000038FA000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1397253623.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1425124973.00000000038DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Aura.exeVirustotal: Detection: 41%
                Source: Aura.exeReversingLabs: Detection: 36%
                Source: C:\Users\user\Desktop\Aura.exeFile read: C:\Users\user\Desktop\Aura.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8488 -s 400
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Aura.exeStatic file information: File size 1381888 > 1048576
                Source: Aura.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABDAAA push ecx; ret 0_2_00ABDABD
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABDAAA push ecx; ret 2_2_00ABDABD
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0043F467 pushad ; iretd 3_2_0043F46B
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_00454909 push ecx; retf 3_2_0045490A
                Source: Aura.exeStatic PE information: section name: .text entropy: 7.096196420710893
                Source: C:\Users\user\Desktop\Aura.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Aura.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Aura.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeWindow / User API: threadDelayed 6008Jump to behavior
                Source: C:\Users\user\Desktop\Aura.exe TID: 8600Thread sleep time: -210000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Aura.exe TID: 9128Thread sleep count: 6008 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Aura.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Aura.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Aura.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ACF86F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00ACF86F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ACF7BE FindFirstFileExW,0_2_00ACF7BE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ACF86F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00ACF86F
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ACF7BE FindFirstFileExW,2_2_00ACF7BE
                Source: Amcache.hve.6.drBinary or memory string: VMware
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: Aura.exe, 00000003.00000003.1425430503.000000000392D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Aura.exe, 00000003.00000003.1353712898.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1484274331.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2578879535.000000000132B000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1554970055.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1509341317.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353557204.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1483876553.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.2198771625.000000000132A000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2578727115.00000000012EC000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.2198373308.0000000001327000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: Aura.exe, 00000003.00000003.1353712898.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1484274331.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2578879535.000000000132B000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1554970055.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1509341317.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353557204.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1483876553.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.2198771625.000000000132A000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.2198373308.0000000001327000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWyk!
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.LOG1.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.24224532.B64.2408191502,BiosReleaseDate:08/19/2024,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.LOG1.6.drBinary or memory string: VMware, Inc.
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: Amcache.hve.LOG1.6.drBinary or memory string: VMware Virtual RAMX
                Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 d9 2e dc 89 72 dd-92 e8 86 9f a5 a6 64 93
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Aura.exe, 00000003.00000003.1425430503.0000000003928000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: C:\Users\user\Desktop\Aura.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\Aura.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeCode function: 3_2_0044B1C0 LdrInitializeThunk,3_2_0044B1C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AC58AE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AC58AE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AE61B4 mov edi, dword ptr fs:[00000030h]0_2_00AE61B4
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ACB1FC GetProcessHeap,0_2_00ACB1FC
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AC58AE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AC58AE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABD3C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00ABD3C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABD77C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00ABD77C
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABD770 SetUnhandledExceptionFilter,0_2_00ABD770
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00AC58AE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00AC58AE
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABD3C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00ABD3C0
                Source: C:\Users\user\Desktop\Aura.exeCode function: 2_2_00ABD77C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00ABD77C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00AE61B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00AE61B4
                Source: C:\Users\user\Desktop\Aura.exeMemory written: C:\Users\user\Desktop\Aura.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Aura.exeProcess created: C:\Users\user\Desktop\Aura.exe "C:\Users\user\Desktop\Aura.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,0_2_00ACF0C6
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,0_2_00ACF067
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,0_2_00ACF19B
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,0_2_00ACF1E6
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00ACF28D
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,0_2_00ACAAE7
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,0_2_00ACF393
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00ACEB28
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,0_2_00ACA5EC
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,0_2_00ACED79
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00ACEE14
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,2_2_00ACF0C6
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,2_2_00ACF067
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,2_2_00ACF19B
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,2_2_00ACF1E6
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00ACF28D
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,2_2_00ACAAE7
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,2_2_00ACF393
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00ACEB28
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,2_2_00ACA5EC
                Source: C:\Users\user\Desktop\Aura.exeCode function: EnumSystemLocalesW,2_2_00ACED79
                Source: C:\Users\user\Desktop\Aura.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00ACEE14
                Source: C:\Users\user\Desktop\Aura.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeCode function: 0_2_00ABE1B7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00ABE1B7
                Source: C:\Users\user\Desktop\Aura.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Aura.exe, 00000003.00000003.1555362408.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1509261866.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1509341317.000000000131C000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.2198750598.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1508934868.000000000131B000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1534242372.00000000013AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                Source: C:\Users\user\Desktop\Aura.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Aura.exe PID: 8556, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.Aura.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Aura.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2578327207.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Aura.exe, 00000003.00000003.1509536347.000000000133B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: Aura.exe, 00000003.00000003.1484126690.0000000001383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Aura.exe, 00000003.00000003.1484126690.00000000012FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\Desktop\Aura.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: Yara matchFile source: 00000003.00000003.1484274331.0000000001327000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.1425991879.0000000001383000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.1484126690.0000000001327000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.1483876553.0000000001327000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Aura.exe PID: 8556, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Aura.exe PID: 8556, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.Aura.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Aura.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2578327207.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1392334307.0000000002BEC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                22
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory251
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Deobfuscate/Decode Files or Information
                Security Account Manager22
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares41
                Data from Local System
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
                Obfuscated Files or Information
                NTDS1
                Process Discovery
                Distributed Component Object Model3
                Clipboard Data
                14
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Software Packing
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials11
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Aura.exe41%VirustotalBrowse
                Aura.exe37%ReversingLabsWin32.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://jowinjoinery.icu/100%Avira URL Cloudmalware
                https://jowinjoinery.icu/P100%Avira URL Cloudmalware
                https://mrodularmall.top:443/aNzS100%Avira URL Cloudmalware
                https://mrodularmall.top:443/aNzShv.default-release/key4.dbPK100%Avira URL Cloudmalware
                https://astralconnec.icu/DPowko100%Avira URL Cloudmalware
                https://mrodularmall.top/8100%Avira URL Cloudmalware
                https://mrodularmall.top/P=C:100%Avira URL Cloudmalware
                https://mrodularmall.top:443/aNzSMicrosoft100%Avira URL Cloudmalware
                https://jowinjoinery.icu/bdWUa100%Avira URL Cloudmalware
                https://mrodularmall.top/aNzSy100%Avira URL Cloudmalware
                https://mrodularmall.top/Sb100%Avira URL Cloudmalware
                https://jowinjoinery.icu/cb100%Avira URL Cloudmalware
                https://featureccus.shop/l100%Avira URL Cloudmalware
                https://mrodularmall.top/a100%Avira URL Cloudmalware
                https://mrodularmall.top/aNzS100%Avira URL Cloudmalware
                https://mrodularmall.top/p#b100%Avira URL Cloudmalware
                https://web.telegram.orgPersistent-AuthWWW-AuthenticateVarystel_ssid=534dbfa6f9df898e79_1737709529140%Avira URL Cloudsafe
                https://jowinjoinery.icu:443/bdWUaicrosoft100%Avira URL Cloudmalware
                https://web.telegram.orgX-Frame-OptionsALLOW-FROM0%Avira URL Cloudsafe
                https://mrodularmall.top/Y100%Avira URL Cloudmalware
                https://mrodularmall.top/aNzSim100%Avira URL Cloudmalware
                https://featureccus.shop/bdMAnM100%Avira URL Cloudmalware
                https://mrodularmall.top/100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                jowinjoinery.icu
                188.114.97.3
                truetrue
                  unknown
                  t.me
                  149.154.167.99
                  truefalse
                    high
                    featureccus.shop
                    104.21.93.43
                    truefalse
                      high
                      mrodularmall.top
                      104.21.16.1
                      truetrue
                        unknown
                        astralconnec.icu
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://jowinjoinery.icu/bdWUatrue
                          • Avira URL Cloud: malware
                          unknown
                          https://mrodularmall.top/aNzSfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://t.me/asdawfqfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://jowinjoinery.icu/Aura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://mrodularmall.top/P=C:Aura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://t.me/Aura.exe, 00000003.00000003.1353557204.000000000133B000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353634903.0000000001303000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1395874766.0000000001303000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/ac/?q=Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://web.telegram.orgAura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://mrodularmall.top/aNzSyAura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://mrodularmall.top:443/aNzSMicrosoftAura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://jowinjoinery.icu/PAura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://mrodularmall.top/8Aura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://astralconnec.icu/DPowkoAura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://mrodularmall.top:443/aNzShv.default-release/key4.dbPKAura.exe, 00000003.00000003.1508869079.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1477825528.00000000038F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://mrodularmall.top:443/aNzSAura.exe, 00000003.00000003.1449006745.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1425124973.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1423142277.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1508869079.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1424052324.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1477825528.00000000038F4000.00000004.00000800.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1395874766.0000000001303000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1424492990.00000000038F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.rootca1.amazontrust.com/rootca1.crl0Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://ac.ecosia.org?q=Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://jowinjoinery.icu/cbAura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://upx.sf.netAmcache.hve.6.drfalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://ocsp.rootca1.amazontrust.com0:Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brAura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://mrodularmall.top/SbAura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://www.google.com/images/branding/product/ico/googleg_alldp.icoAura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://featureccus.shop/lAura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://mrodularmall.top/p#bAura.exe, 00000003.00000003.2198542182.00000000013A9000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000002.2579059811.00000000013AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://www.ecosia.org/newtab/v20Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://mrodularmall.top/aAura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://web.telegram.orgPersistent-AuthWWW-AuthenticateVarystel_ssid=534dbfa6f9df898e79_173770952914Aura.exe, 00000003.00000003.1353712898.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353557204.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://web.telegram.orgX-Frame-OptionsALLOW-FROMAura.exe, 00000003.00000003.1353712898.0000000001327000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1353557204.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://x1.c.lencr.org/0Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://x1.i.lencr.org/0Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://jowinjoinery.icu:443/bdWUaicrosoftAura.exe, 00000003.00000002.2579588323.00000000038F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchAura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?Aura.exe, 00000003.00000003.1449954436.0000000003913000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://mrodularmall.top/YAura.exe, 00000003.00000003.1509261866.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://duckduckgo.com/chrome_newtabv209hAura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://mrodularmall.top/aNzSimAura.exe, 00000003.00000003.1555362408.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1555401145.00000000013B5000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1534242372.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://featureccus.shop/bdMAnMAura.exe, 00000003.00000003.1395874766.0000000001327000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://support.mozilla.org/products/firefoxgro.allAura.exe, 00000003.00000003.1451593904.0000000003AEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://gemini.google.com/app?q=Aura.exe, 00000003.00000003.1397442042.00000000038E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://mrodularmall.top/Aura.exe, 00000003.00000003.1425991879.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1509261866.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, Aura.exe, 00000003.00000003.1534242372.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    104.21.93.43
                                                                    featureccus.shopUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    104.21.16.1
                                                                    mrodularmall.topUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    188.114.97.3
                                                                    jowinjoinery.icuEuropean Union
                                                                    13335CLOUDFLARENETUStrue
                                                                    149.154.167.99
                                                                    t.meUnited Kingdom
                                                                    62041TELEGRAMRUfalse
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1635429
                                                                    Start date and time:2025-03-11 17:09:15 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 8m 17s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:15
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:Aura.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@7/6@5/4
                                                                    EGA Information:
                                                                    • Successful, ratio: 66.7%
                                                                    HCA Information:
                                                                    • Successful, ratio: 89%
                                                                    • Number of executed functions: 17
                                                                    • Number of non-executed functions: 137
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 20.189.173.21, 40.126.31.1, 4.175.87.197, 150.171.27.10, 2.19.122.46
                                                                    • Excluded domains from analysis (whitelisted): www.bing.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, g.bing.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Execution Graph export aborted for target Aura.exe, PID 8548 because there are no executed function
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    TimeTypeDescription
                                                                    12:10:12API Interceptor8x Sleep call for process: Aura.exe modified
                                                                    12:10:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):0.7132533790842776
                                                                    Encrypted:false
                                                                    SSDEEP:96:TKFAA05csahwoI7RM6tQXIDcQvc6QcEVcw3cE/n+HbHg/TgJ3YOZUXOyK/ZAX/dj:un05cj0BU/gj/+zuiFnZ24IO8O
                                                                    MD5:BA8B74B6F02DD3E0662F8EDFFC41754C
                                                                    SHA1:7A157A25BA9D6D558A1BB8965368A3EBDF3707DA
                                                                    SHA-256:C0B487B05760D8EF1431208939E1832136F77E843C20B77CE63E7C88CF56833F
                                                                    SHA-512:A7BD644567862D5F92ECDC6BB440D0D6877922EB47D7CAC5601D06ECD3FB39E13EC14A4C6CC0433AD0767089606DB82A2B9566B2E742BD2EBE68D922798E72D1
                                                                    Malicious:true
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.6.1.8.3.0.1.0.5.8.4.7.0.1.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.6.1.8.3.0.1.1.0.0.6.5.8.2.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.f.1.2.8.5.2.c.-.7.a.6.7.-.4.4.9.5.-.9.8.b.c.-.e.5.4.1.d.a.4.5.2.b.2.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.4.6.0.9.3.9.4.-.2.4.a.9.-.4.7.7.0.-.8.b.0.7.-.a.d.4.f.f.d.0.b.3.e.8.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.u.r.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.2.1.2.8.-.0.0.0.1.-.0.0.1.8.-.7.9.b.5.-.f.a.0.f.a.0.9.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.0.9.2.f.3.8.a.9.1.e.8.4.d.d.a.1.7.b.5.7.9.e.d.e.4.7.3.f.d.d.4.0.0.0.0.f.f.f.f.!.0.0.0.0.1.d.5.1.7.6.2.9.c.8.9.9.4.f.8.7.a.f.f.9.2.4.8.6.2.c.2.f.9.9.c.a.1.d.f.c.4.3.3.a.!.A.u.r.a...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.5././.0.3././.1.1.:.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 14 streams, Tue Mar 11 16:10:10 2025, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):36832
                                                                    Entropy (8bit):1.7717604961668305
                                                                    Encrypted:false
                                                                    SSDEEP:96:5c8rg9nLpL+GFbxy7B+4mY8i7OVlUt7sRt6ihJXsTXMZvnO6LypEUpWIkWImjIBN:F094ph8OXYRt6iUTXyXeXpuPvwcXJ3l
                                                                    MD5:C59EA3238E87B455C08E821F3387A94E
                                                                    SHA1:0960C7AC804EFA581D2BF35D35688ED290EA551F
                                                                    SHA-256:AD493586A18B8A6CF6E177FA04DF9B73EBD1BD2028D0C049C68351CA4DB0BE09
                                                                    SHA-512:6FFC1CE9B92A49BED13690976530B7D2812B03574CA7D86C91287D5B0E606E6D2FFA5ACA4977115B12A878965A542EF6FB511B0A2C826D5E2C235293CF6B9807
                                                                    Malicious:false
                                                                    Preview:MDMP..a..... .......b`.g........................0...............Z...........T.......8...........T...........(...........................................................................................................eJ......P.......GenuineIntel............T.......(!..a`.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8376
                                                                    Entropy (8bit):3.6957709653437276
                                                                    Encrypted:false
                                                                    SSDEEP:192:R6l7wVeJaF6bJk6YVUSU+Jgmf3Kpr789bbasf0Jm:R6lXJQ6W6YGSU+Jgmf3Db5f3
                                                                    MD5:793E19E273C886C55948CBB357F48093
                                                                    SHA1:7BADB23B84D0588F34F174764D95D0B7BB8558F8
                                                                    SHA-256:C72EE3A957801359E7E80DF1F9CDE7A1D298752A821E8BDD74AB771C620B1DEC
                                                                    SHA-512:DA191CC3497028D210746AE57F9BC12A7FFFBB767E4EE5157FD5A18C8EF2DE0D598290681755A4D98D6AAAB88C7325EBCBF38BB2B0D159C92B4FD0688E830935
                                                                    Malicious:false
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.4.8.8.<./.P.i.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4690
                                                                    Entropy (8bit):4.459116044