Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Product Order Hirsch 1475.exe

Overview

General Information

Sample name:Product Order Hirsch 1475.exe
Analysis ID:1636901
MD5:c115613bdeeef582663b98b91348ba55
SHA1:2da29044cff0ee0d983a4c5794842fd59206ea3a
SHA256:127e0f05b7b37ee7c27e2cf7bea75f5eae94be3e237ae3a60f9176950d0d68f5
Tags:exeuser-lowmal3
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk/sendMessage?chat_id=7854955274", "Token": "7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk", "Chat_id": "7854955274", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3662820175.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x148ce:$a1: get_encryptedPassword
        • 0x14bba:$a2: get_encryptedUsername
        • 0x146da:$a3: get_timePasswordChanged
        • 0x147d5:$a4: get_passwordField
        • 0x148e4:$a5: set_encryptedPassword
        • 0x15f8b:$a7: get_logins
        • 0x15eee:$a10: KeyLoggerEventArgs
        • 0x15b59:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x198a4:$x1: $%SMTPDV$
        • 0x18288:$x2: $#TheHashHere%&
        • 0x1984c:$x3: %FTPDV$
        • 0x18228:$x4: $%TelegramDv$
        • 0x15b59:$x5: KeyLoggerEventArgs
        • 0x15eee:$x5: KeyLoggerEventArgs
        • 0x19870:$m2: Clipboard Logs ID
        • 0x19aae:$m2: Screenshot Logs ID
        • 0x19bbe:$m2: keystroke Logs ID
        • 0x19e98:$m3: SnakePW
        • 0x19a86:$m4: \SnakeKeylogger\
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12cce:$a1: get_encryptedPassword
            • 0x12fba:$a2: get_encryptedUsername
            • 0x12ada:$a3: get_timePasswordChanged
            • 0x12bd5:$a4: get_passwordField
            • 0x12ce4:$a5: set_encryptedPassword
            • 0x1438b:$a7: get_logins
            • 0x142ee:$a10: KeyLoggerEventArgs
            • 0x13f59:$a11: KeyLoggerEventArgsEventHandler
            1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a65a:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x1988c:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19cbf:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1acfe:$a5: \Kometa\User Data\Default\Login Data
            1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x138c7:$s1: UnHook
            • 0x138ce:$s2: SetHook
            • 0x138d6:$s3: CallNextHook
            • 0x138e3:$s4: _hook
            Click to see the 23 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-13T08:51:07.577363+010028033053Unknown Traffic192.168.2.649688104.21.80.1443TCP
            2025-03-13T08:51:16.082873+010028033053Unknown Traffic192.168.2.649695104.21.80.1443TCP
            2025-03-13T08:51:18.881915+010028033053Unknown Traffic192.168.2.649698104.21.80.1443TCP
            2025-03-13T08:51:21.558161+010028033053Unknown Traffic192.168.2.649702104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-13T08:51:03.016519+010028032742Potentially Bad Traffic192.168.2.649684132.226.247.7380TCP
            2025-03-13T08:51:05.547671+010028032742Potentially Bad Traffic192.168.2.649684132.226.247.7380TCP
            2025-03-13T08:51:08.360166+010028032742Potentially Bad Traffic192.168.2.649690132.226.247.7380TCP
            2025-03-13T08:51:11.172694+010028032742Potentially Bad Traffic192.168.2.649692132.226.247.7380TCP
            2025-03-13T08:51:13.938300+010028032742Potentially Bad Traffic192.168.2.649694132.226.247.7380TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Product Order Hirsch 1475.exeAvira: detected
            Source: 00000003.00000002.3662820175.0000000002DF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk/sendMessage?chat_id=7854955274", "Token": "7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk", "Chat_id": "7854955274", "Version": "5.1"}
            Source: Product Order Hirsch 1475.exeVirustotal: Detection: 35%Perma Link
            Source: Product Order Hirsch 1475.exeReversingLabs: Detection: 34%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackString decryptor:
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackString decryptor: 7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpackString decryptor: 7854955274

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Product Order Hirsch 1475.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.6:49686 version: TLS 1.0
            Source: Product Order Hirsch 1475.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 0133F1F6h3_2_0133F007
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 0133FB80h3_2_0133F007
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0133E528
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0133EB5B
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0133ED3C
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD8D4Dh3_2_06AD8A10
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD6579h3_2_06AD62D0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD5CC9h3_2_06AD5A20
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD6121h3_2_06AD5E78
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06AD37B0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD6E29h3_2_06AD6B80
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06AD37C0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD7281h3_2_06AD6FD8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD69D1h3_2_06AD6728
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD7B59h3_2_06AD78B0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD0741h3_2_06AD0498
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD0B99h3_2_06AD08F0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD02E9h3_2_06AD0040
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD7702h3_2_06AD7458
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD5849h3_2_06AD55A0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD8861h3_2_06AD85B8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD7FB1h3_2_06AD7D08
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD8409h3_2_06AD8160
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 4x nop then jmp 06AD0FF1h3_2_06AD0D48
            Source: global trafficTCP traffic: 192.168.2.6:62404 -> 162.159.36.2:53
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
            Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49692 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49694 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49684 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49690 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49698 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49695 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49688 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49702 -> 104.21.80.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.6:49686 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F64000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F56000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F49000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EAA000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F64000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F56000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F49000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002DF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F64000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F56000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F49000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002ECE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002DF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F64000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F56000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F49000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002FAD000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F64000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F56000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000002F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
            Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702

            System Summary

            barindex
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: Product Order Hirsch 1475.exe
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_00A93E1C1_2_00A93E1C
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A67D001_2_06A67D00
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A69AF81_2_06A69AF8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A647B81_2_06A647B8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A63F481_2_06A63F48
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A67CF01_2_06A67CF0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A664081_2_06A66408
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A65A581_2_06A65A58
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A643801_2_06A64380
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A643701_2_06A64370
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A67D001_2_06A67D00
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013361083_2_01336108
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133C1903_2_0133C190
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133F0073_2_0133F007
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133B3283_2_0133B328
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133C4703_2_0133C470
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133C7523_2_0133C752
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013398583_2_01339858
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013368803_2_01336880
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133BBD23_2_0133BBD2
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133CA323_2_0133CA32
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_01334AD93_2_01334AD9
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133BEB03_2_0133BEB0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013391703_2_01339170
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133215C3_2_0133215C
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133300F3_2_0133300F
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013330623_2_01333062
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013330AE3_2_013330AE
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133330E3_2_0133330E
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133E5283_2_0133E528
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133E5173_2_0133E517
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_013335723_2_01333572
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_0133B4F23_2_0133B4F2
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADB6F03_2_06ADB6F0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD8A103_2_06AD8A10
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADAA603_2_06ADAA60
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADD6783_2_06ADD678
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADC3903_2_06ADC390
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADB0A83_2_06ADB0A8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADD0303_2_06ADD030
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADA4103_2_06ADA410
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD90593_2_06AD9059
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD11A03_2_06AD11A0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADC9E03_2_06ADC9E0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADBD403_2_06ADBD40
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADB6E13_2_06ADB6E1
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD62C03_2_06AD62C0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD62D03_2_06AD62D0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD5A203_2_06AD5A20
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD8A0B3_2_06AD8A0B
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD5A133_2_06AD5A13
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD5E683_2_06AD5E68
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADD66A3_2_06ADD66A
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD5E783_2_06AD5E78
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADAA5A3_2_06ADAA5A
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD37B03_2_06AD37B0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD6B803_2_06AD6B80
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADC3803_2_06ADC380
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD6FC93_2_06AD6FC9
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD37C03_2_06AD37C0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD6FD83_2_06AD6FD8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD67283_2_06AD6728
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD3B383_2_06AD3B38
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD671B3_2_06AD671B
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD6B733_2_06AD6B73
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD78B03_2_06AD78B0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD04883_2_06AD0488
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD789F3_2_06AD789F
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD04983_2_06AD0498
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADB0973_2_06ADB097
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD08E03_2_06AD08E0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD7CF83_2_06AD7CF8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD08F03_2_06AD08F0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD2C203_2_06AD2C20
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADD0203_2_06ADD020
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD48383_2_06AD4838
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD2C0F3_2_06AD2C0F
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD00063_2_06AD0006
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADA4003_2_06ADA400
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD00403_2_06AD0040
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD74583_2_06AD7458
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD74513_2_06AD7451
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD85A83_2_06AD85A8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD55A03_2_06AD55A0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD85B83_2_06AD85B8
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD55973_2_06AD5597
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD11913_2_06AD1191
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADC9D03_2_06ADC9D0
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD0D393_2_06AD0D39
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADBD303_2_06ADBD30
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD7D083_2_06AD7D08
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD81603_2_06AD8160
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD0D483_2_06AD0D48
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD81503_2_06AD8150
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1225072731.00000000066B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1221560737.0000000002401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1221560737.00000000025FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1221560737.0000000002415000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1220189902.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000001.00000002.1225256007.00000000069C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3661205423.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3661331539.0000000000F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exeBinary or memory string: OriginalFilenamezLyI.exe8 vs Product Order Hirsch 1475.exe
            Source: Product Order Hirsch 1475.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Product Order Hirsch 1475.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, z2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, z2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, z2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, z2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, ---.csBase64 encoded string: 'JzeJw/b9xm+6S2XbSxm04VLxDXW0s8jprFo3QVj1S6zHgpFf8L4EKsa9LKLu5QP6'
            Source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, ---.csBase64 encoded string: 'JzeJw/b9xm+6S2XbSxm04VLxDXW0s8jprFo3QVj1S6zHgpFf8L4EKsa9LKLu5QP6'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, qaGH5uEUrRK2412hok.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, qaGH5uEUrRK2412hok.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, qaGH5uEUrRK2412hok.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, qaGH5uEUrRK2412hok.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Product Order Hirsch 1475.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMutant created: NULL
            Source: Product Order Hirsch 1475.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Product Order Hirsch 1475.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000003036000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3664411044.0000000003E7D000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000003044000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000003026000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.0000000003078000.00000004.00000800.00020000.00000000.sdmp, Product Order Hirsch 1475.exe, 00000003.00000002.3662820175.000000000306C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Product Order Hirsch 1475.exeVirustotal: Detection: 35%
            Source: Product Order Hirsch 1475.exeReversingLabs: Detection: 34%
            Source: unknownProcess created: C:\Users\user\Desktop\Product Order Hirsch 1475.exe "C:\Users\user\Desktop\Product Order Hirsch 1475.exe"
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess created: C:\Users\user\Desktop\Product Order Hirsch 1475.exe "C:\Users\user\Desktop\Product Order Hirsch 1475.exe"
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess created: C:\Users\user\Desktop\Product Order Hirsch 1475.exe "C:\Users\user\Desktop\Product Order Hirsch 1475.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: iconcodecservice.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Product Order Hirsch 1475.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Product Order Hirsch 1475.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, dLMc7sNLZ0KVR4Mtj8.cs.Net Code: jFGuOHtM88 System.Reflection.Assembly.Load(byte[])
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, dLMc7sNLZ0KVR4Mtj8.cs.Net Code: jFGuOHtM88 System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A6BEA3 pushfd ; retf 1_2_06A6BEA9
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 1_2_06A6BE18 pushad ; retf 1_2_06A6BE19
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADEFEE push es; iretd 3_2_06ADEFEC
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06AD8F60 push es; ret 3_2_06AD904C
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADF19A push es; iretd 3_2_06ADF22C
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeCode function: 3_2_06ADE190 push es; iretd 3_2_06ADEFEC
            Source: Product Order Hirsch 1475.exeStatic PE information: section name: .text entropy: 7.822969317321778
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, RhmHap0PUGpBE91PZ6.csHigh entropy of concatenated method names: 'Km1OAQiIC', 'jcMLtfOYL', 'T5hmS0fF1', 'cbn4j8SqQ', 'C5XjK1GR7', 'gXdSQTqO3', 't20yfe92gUxVZYtmyu', 'MyJ0dxj4Lfkb67ZTiL', 'x9JMBJU1d', 'eHfee6M5g'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, u2MlrhPPITKBKMo8eDq.csHigh entropy of concatenated method names: 'uHZea54MLA', 'RtCezGC2Ve', 'pEk5IW9DCY', 'vKd5PJkq1c', 'l2n50naIiT', 'Dib5tqUFAN', 'dU05uYuhi8', 'Uls563f9Hb', 'BL75X2mdnk', 'zto5JoRAHt'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, uq16oU8GE5uEHtmX9L.csHigh entropy of concatenated method names: 'WXZ26Hf0Dg', 'UjI2JANSJt', 'BjB27jutsi', 'Cmx2oRFoEV', 'ork2NC4IfU', 'QHN7B3iJQf', 'Qvs7Vwj4Z1', 'XLp7HlIQ2K', 'Tql7ZEZiCW', 'Fhs7lvdtJ3'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, QORDP6PIuM4Ys8i08An.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lJBenKuUV0', 'bdVehC4cXn', 'nZUekW5xXJ', 'xe5e35BxLh', 'nPEexFaBr2', 'rtbegCFlOg', 'AqReQYjxC8'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, aH9gI7lC9uLUZZwEf3.csHigh entropy of concatenated method names: 'AJsf8vR0Yh', 'CqgfWepUNV', 'iirfpdNlUv', 'q62fGJslik', 'uTEfTlSq1G', 'LwJfbaSkvi', 'wSvf9Oiy4o', 'KJ1frdCF2e', 'SUxf1wH69l', 'ERRfK0KfMk'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, sDq4dDSQoHJWatRMxJ.csHigh entropy of concatenated method names: 'KZP7Y9FPk2', 'Ucq74bC367', 'wOnvpfTEvO', 'CK2vGsmLik', 'zHVvT5e6ZW', 'h7lvbXOHZA', 'FVHv96gGcN', 'rMYvrcg6SI', 'mupv1QafWr', 'HLNvK3LZyp'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, HCvUl3HEEaYxN07YC2.csHigh entropy of concatenated method names: 'eBXfc74BHm', 'xIFfyQLkud', 'fMFffEaGuY', 'U8Hf5fXWPY', 'ehCfDRrT5h', 'oKRfAZXrjv', 'Dispose', 'zmaMXikaS8', 'cKQMJJr70T', 'nmfMv5B6T7'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, PUXroyziidHvJY8p0X.csHigh entropy of concatenated method names: 'NyTemtG7v6', 'WrmeE2D4wt', 'wnrejjhLhC', 'LQRe8TnqOY', 'LvreWPoimI', 'QqneGxIag9', 'NLheT66llw', 'kYheAmS9IB', 'PLbeRIQnOl', 'ALUes0GPH7'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, LySciLknQMs3lOHQy5.csHigh entropy of concatenated method names: 'cNOdEWkZgy', 'mmGdj2nKAu', 'qxRd8ILMSj', 'yGSdWngaEC', 'kpUdGJ28FJ', 'u7JdTQ0ICg', 'XbXd9AKfhS', 'e3Edrh7W9L', 'Tw0dK7fhUW', 'drNdnpXYn0'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, xAYv03j9oMbu5LvMgK.csHigh entropy of concatenated method names: 'mx1vLAkRlQ', 't59vmMevuA', 'Wh5vEajqPj', 'xX1vjGIx2D', 'UsGvcaN7Du', 'jEyvienQXd', 'zx9vygLsYe', 'sFQvMW1nv5', 'Hdfvf7HwVV', 'vuBveSNdsR'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, EgAFyd9Pn1RNrNvnia.csHigh entropy of concatenated method names: 'Ui1oXQKj5g', 'pU1ovtbyqm', 'Xcso2JN30M', 'nxb2an4LMf', 'IrN2z9ZQCy', 'yfhoIhqnCf', 'ksooP09xr6', 'D5Ko0NTcBq', 'XhSotNvAOQ', 'oQEou4WlK9'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, eBJTbYPuNsvTkpKfLka.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'L8BCfWpRwR', 'OTyCefrqih', 'BAjC5hoQaa', 'MmeCCyPxMn', 'TvPCDSEl4n', 'LUJCwaUdSx', 'p88CA0JccG'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, qaGH5uEUrRK2412hok.csHigh entropy of concatenated method names: 'uXAJ3xr9Ia', 'ri6JxjVJfT', 'vxbJgf85NC', 'b8yJQJ3kEV', 'BpHJB4CyVb', 'COoJVC8GQN', 'TixJHumSOX', 'YJyJZi3i9h', 'vxYJlgoKyG', 'qpEJamAabK'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, rYBSE81kyVH9yUIUJm.csHigh entropy of concatenated method names: 'o8LoRs64CV', 'a1losi1etN', 'IBEoO64ML5', 'uQjoLY2hZM', 'Q9uoYaUn5T', 'Dnuom9IdRl', 'D1ho4lcIdW', 'BKKoEoZFJc', 'gCFojFLZcp', 'toJoS2HLEN'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, SbCswgP0PSN7boKZ3PM.csHigh entropy of concatenated method names: 'ToString', 'zwe5EdnG8U', 'YsZ5joicSj', 'ILq5SvBNZw', 'f3R58mHErI', 'zsh5WTBW3m', 'R8d5pyOevp', 'lXF5GbealD', 'wYTvSSXKVyAuLNfl0JY', 'fa235CXkCB6Ew8o23KN'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, dcy01xuyX5oP6hMpco.csHigh entropy of concatenated method names: 'huyPoaGH5u', 'lrRPNK2412', 'Q9oPUMbu5L', 'hMgPqKfDq4', 'dRMPcxJCq1', 'eoUPiGE5uE', 'sAgLpZiXt0XKTYlQfG', 'uJSJ6cRqHYRtADFTr7', 'vafPPqlYNB', 'HgkPtoDQHu'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, v5cr7cavvUHLr4B53A.csHigh entropy of concatenated method names: 'SoDevIiulB', 'mP9e7dcKSM', 'vBLe2ylJB6', 'OTweonYaEy', 'u7qef1Dfxq', 'vHheNE9Z7B', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, a6MB9agSGSKtv2l1Uk.csHigh entropy of concatenated method names: 'ToString', 'QEEinxAiU0', 'on7iW7IGqq', 'BZUippLWT5', 'sHtiGoA6cW', 'DgaiThJadD', 'uQqibCpNPM', 'l4Di9BtCCt', 'g2Tiruuwfv', 'CXPi1lTEEy'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, l0SvTsVZV44HY3CG1J.csHigh entropy of concatenated method names: 'RdvyZRZrWa', 'QELyaWVlnT', 'uspMITEU0y', 'cDyMPJQMCU', 'LBeyn2jR6m', 'k5JyhJK7MZ', 'cgYykgVi07', 'HgYy3u7gnw', 'lbhyx7B0po', 'l0Vygdqvco'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, rMqNJiJeAZCZ69flpu.csHigh entropy of concatenated method names: 'Dispose', 'YYxPlN07YC', 'H8n0W1jLpV', 'XdQD15XVt4', 'jVnPaH1bUv', 'v9gPzAO5eb', 'ProcessDialogKey', 'ElI0IH9gI7', 'u9u0PLUZZw', 'Df300D5cr7'
            Source: 1.2.Product Order Hirsch 1475.exe.69c0000.5.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csHigh entropy of concatenated method names: 'hxQt6EAFu4', 'eiItXsF4FV', 'K8htJohfme', 'h4GtvBGLsq', 'YRlt7HNtac', 'EUIt2CjJpd', 'uW3toOMHZN', 'jqMtNiqMF9', 'R6XtFCsvmQ', 'aMOtUARPOa'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, RhmHap0PUGpBE91PZ6.csHigh entropy of concatenated method names: 'Km1OAQiIC', 'jcMLtfOYL', 'T5hmS0fF1', 'cbn4j8SqQ', 'C5XjK1GR7', 'gXdSQTqO3', 't20yfe92gUxVZYtmyu', 'MyJ0dxj4Lfkb67ZTiL', 'x9JMBJU1d', 'eHfee6M5g'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, u2MlrhPPITKBKMo8eDq.csHigh entropy of concatenated method names: 'uHZea54MLA', 'RtCezGC2Ve', 'pEk5IW9DCY', 'vKd5PJkq1c', 'l2n50naIiT', 'Dib5tqUFAN', 'dU05uYuhi8', 'Uls563f9Hb', 'BL75X2mdnk', 'zto5JoRAHt'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, uq16oU8GE5uEHtmX9L.csHigh entropy of concatenated method names: 'WXZ26Hf0Dg', 'UjI2JANSJt', 'BjB27jutsi', 'Cmx2oRFoEV', 'ork2NC4IfU', 'QHN7B3iJQf', 'Qvs7Vwj4Z1', 'XLp7HlIQ2K', 'Tql7ZEZiCW', 'Fhs7lvdtJ3'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, QORDP6PIuM4Ys8i08An.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lJBenKuUV0', 'bdVehC4cXn', 'nZUekW5xXJ', 'xe5e35BxLh', 'nPEexFaBr2', 'rtbegCFlOg', 'AqReQYjxC8'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, aH9gI7lC9uLUZZwEf3.csHigh entropy of concatenated method names: 'AJsf8vR0Yh', 'CqgfWepUNV', 'iirfpdNlUv', 'q62fGJslik', 'uTEfTlSq1G', 'LwJfbaSkvi', 'wSvf9Oiy4o', 'KJ1frdCF2e', 'SUxf1wH69l', 'ERRfK0KfMk'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, sDq4dDSQoHJWatRMxJ.csHigh entropy of concatenated method names: 'KZP7Y9FPk2', 'Ucq74bC367', 'wOnvpfTEvO', 'CK2vGsmLik', 'zHVvT5e6ZW', 'h7lvbXOHZA', 'FVHv96gGcN', 'rMYvrcg6SI', 'mupv1QafWr', 'HLNvK3LZyp'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, HCvUl3HEEaYxN07YC2.csHigh entropy of concatenated method names: 'eBXfc74BHm', 'xIFfyQLkud', 'fMFffEaGuY', 'U8Hf5fXWPY', 'ehCfDRrT5h', 'oKRfAZXrjv', 'Dispose', 'zmaMXikaS8', 'cKQMJJr70T', 'nmfMv5B6T7'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, PUXroyziidHvJY8p0X.csHigh entropy of concatenated method names: 'NyTemtG7v6', 'WrmeE2D4wt', 'wnrejjhLhC', 'LQRe8TnqOY', 'LvreWPoimI', 'QqneGxIag9', 'NLheT66llw', 'kYheAmS9IB', 'PLbeRIQnOl', 'ALUes0GPH7'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, LySciLknQMs3lOHQy5.csHigh entropy of concatenated method names: 'cNOdEWkZgy', 'mmGdj2nKAu', 'qxRd8ILMSj', 'yGSdWngaEC', 'kpUdGJ28FJ', 'u7JdTQ0ICg', 'XbXd9AKfhS', 'e3Edrh7W9L', 'Tw0dK7fhUW', 'drNdnpXYn0'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, xAYv03j9oMbu5LvMgK.csHigh entropy of concatenated method names: 'mx1vLAkRlQ', 't59vmMevuA', 'Wh5vEajqPj', 'xX1vjGIx2D', 'UsGvcaN7Du', 'jEyvienQXd', 'zx9vygLsYe', 'sFQvMW1nv5', 'Hdfvf7HwVV', 'vuBveSNdsR'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, EgAFyd9Pn1RNrNvnia.csHigh entropy of concatenated method names: 'Ui1oXQKj5g', 'pU1ovtbyqm', 'Xcso2JN30M', 'nxb2an4LMf', 'IrN2z9ZQCy', 'yfhoIhqnCf', 'ksooP09xr6', 'D5Ko0NTcBq', 'XhSotNvAOQ', 'oQEou4WlK9'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, eBJTbYPuNsvTkpKfLka.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'L8BCfWpRwR', 'OTyCefrqih', 'BAjC5hoQaa', 'MmeCCyPxMn', 'TvPCDSEl4n', 'LUJCwaUdSx', 'p88CA0JccG'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, qaGH5uEUrRK2412hok.csHigh entropy of concatenated method names: 'uXAJ3xr9Ia', 'ri6JxjVJfT', 'vxbJgf85NC', 'b8yJQJ3kEV', 'BpHJB4CyVb', 'COoJVC8GQN', 'TixJHumSOX', 'YJyJZi3i9h', 'vxYJlgoKyG', 'qpEJamAabK'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, rYBSE81kyVH9yUIUJm.csHigh entropy of concatenated method names: 'o8LoRs64CV', 'a1losi1etN', 'IBEoO64ML5', 'uQjoLY2hZM', 'Q9uoYaUn5T', 'Dnuom9IdRl', 'D1ho4lcIdW', 'BKKoEoZFJc', 'gCFojFLZcp', 'toJoS2HLEN'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, SbCswgP0PSN7boKZ3PM.csHigh entropy of concatenated method names: 'ToString', 'zwe5EdnG8U', 'YsZ5joicSj', 'ILq5SvBNZw', 'f3R58mHErI', 'zsh5WTBW3m', 'R8d5pyOevp', 'lXF5GbealD', 'wYTvSSXKVyAuLNfl0JY', 'fa235CXkCB6Ew8o23KN'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, dcy01xuyX5oP6hMpco.csHigh entropy of concatenated method names: 'huyPoaGH5u', 'lrRPNK2412', 'Q9oPUMbu5L', 'hMgPqKfDq4', 'dRMPcxJCq1', 'eoUPiGE5uE', 'sAgLpZiXt0XKTYlQfG', 'uJSJ6cRqHYRtADFTr7', 'vafPPqlYNB', 'HgkPtoDQHu'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, v5cr7cavvUHLr4B53A.csHigh entropy of concatenated method names: 'SoDevIiulB', 'mP9e7dcKSM', 'vBLe2ylJB6', 'OTweonYaEy', 'u7qef1Dfxq', 'vHheNE9Z7B', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, a6MB9agSGSKtv2l1Uk.csHigh entropy of concatenated method names: 'ToString', 'QEEinxAiU0', 'on7iW7IGqq', 'BZUippLWT5', 'sHtiGoA6cW', 'DgaiThJadD', 'uQqibCpNPM', 'l4Di9BtCCt', 'g2Tiruuwfv', 'CXPi1lTEEy'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, l0SvTsVZV44HY3CG1J.csHigh entropy of concatenated method names: 'RdvyZRZrWa', 'QELyaWVlnT', 'uspMITEU0y', 'cDyMPJQMCU', 'LBeyn2jR6m', 'k5JyhJK7MZ', 'cgYykgVi07', 'HgYy3u7gnw', 'lbhyx7B0po', 'l0Vygdqvco'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, rMqNJiJeAZCZ69flpu.csHigh entropy of concatenated method names: 'Dispose', 'YYxPlN07YC', 'H8n0W1jLpV', 'XdQD15XVt4', 'jVnPaH1bUv', 'v9gPzAO5eb', 'ProcessDialogKey', 'ElI0IH9gI7', 'u9u0PLUZZw', 'Df300D5cr7'
            Source: 1.2.Product Order Hirsch 1475.exe.35ae1d0.3.raw.unpack, dLMc7sNLZ0KVR4Mtj8.csHigh entropy of concatenated method names: 'hxQt6EAFu4', 'eiItXsF4FV', 'K8htJohfme', 'h4GtvBGLsq', 'YRlt7HNtac', 'EUIt2CjJpd', 'uW3toOMHZN', 'jqMtNiqMF9', 'R6XtFCsvmQ', 'aMOtUARPOa'
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: A90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 2350000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 96A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 98B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: A8B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 1330000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 2DF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: 4DF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599097Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598972Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598829Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598712Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598483Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598374Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598244Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598134Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598030Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597882Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597780Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597671Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597453Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597343Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597234Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597125Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597015Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596906Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596796Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596468Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596236Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596050Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595904Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595743Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595513Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595296Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595187Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594968Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594749Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594640Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594421Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594312Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594203Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594093Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 593984Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 593874Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeWindow / User API: threadDelayed 2739Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeWindow / User API: threadDelayed 7101Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 2432Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5584Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep count: 34 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -31359464925306218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 6844Thread sleep count: 2739 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 6844Thread sleep count: 7101 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599546s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -599097s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598972s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598829s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598712s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598483s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598374s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598244s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598134s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -598030s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597882s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597780s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -597015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596236s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -596050s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595904s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595743s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595513s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595296s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595187s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -595078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594968s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594749s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594640s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594421s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -594093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -593984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exe TID: 5996Thread sleep time: -593874s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 599097Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598972Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598829Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598712Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598483Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598374Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598244Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598134Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 598030Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597882Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597780Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597671Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597453Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597343Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597234Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597125Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 597015Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596906Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596796Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596468Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596236Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 596050Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595904Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595743Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595513Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595296Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595187Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594968Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594749Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594640Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594421Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594312Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594203Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 594093Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 593984Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeThread delayed: delay time: 593874Jump to behavior
            Source: Product Order Hirsch 1475.exe, 00000003.00000002.3661331539.0000000000FAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeMemory written: C:\Users\user\Desktop\Product Order Hirsch 1475.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeProcess created: C:\Users\user\Desktop\Product Order Hirsch 1475.exe "C:\Users\user\Desktop\Product Order Hirsch 1475.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Users\user\Desktop\Product Order Hirsch 1475.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Users\user\Desktop\Product Order Hirsch 1475.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3662820175.0000000002FBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3662820175.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Product Order Hirsch 1475.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Product Order Hirsch 1475.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3497698.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3476c78.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Product Order Hirsch 1475.exe.3497698.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3662820175.0000000002FBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3660976736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1222191509.0000000003409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3662820175.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Product Order Hirsch 1475.exe PID: 4352, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Product Order Hirsch 1475.exe PID: 1776, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            1
            Security Software Discovery
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
            Obfuscated Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.