Loading ...

Play interactive tourEdit tour

Analysis Report guy2.exe

Overview

General Information

Sample Name:guy2.exe
Analysis ID:323572
MD5:a0e65c4d3bc5fb564f82fe66ab228044
SHA1:ff10833c4ba57938f94c41b75d824ac9e8fe36b4
SHA256:d8e273754006eb7118be058c46efef0a1b20ae4929dad75ecfed1ae1aae0c0eb
Tags:AgentTeslaPEP

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
May check the online IP address of the machine
Moves itself to temp directory
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • guy2.exe (PID: 5980 cmdline: 'C:\Users\user\Desktop\guy2.exe' MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • guy2.exe (PID: 3544 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
  • xQxAsve.exe (PID: 6628 cmdline: 'C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe' MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • xQxAsve.exe (PID: 6760 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • xQxAsve.exe (PID: 6768 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • xQxAsve.exe (PID: 6776 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • xQxAsve.exe (PID: 6796 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
  • xQxAsve.exe (PID: 6864 cmdline: 'C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe' MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • xQxAsve.exe (PID: 6928 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
    • xQxAsve.exe (PID: 7020 cmdline: {path} MD5: A0E65C4D3BC5FB564F82FE66AB228044)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 22 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            18.2.xQxAsve.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.guy2.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                22.2.xQxAsve.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  No Sigma rule has matched

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeReversingLabs: Detection: 43%
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: guy2.exeVirustotal: Detection: 58%Perma Link
                  Source: guy2.exeReversingLabs: Detection: 43%
                  Source: 18.2.xQxAsve.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 1.2.guy2.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 22.2.xQxAsve.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 4x nop then jmp 09C19028h0_2_09C18284
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 4x nop then jmp 08A39028h14_2_08A38284

                  Networking:

                  barindex
                  May check the online IP address of the machineShow sources
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: Joe Sandbox ViewIP Address: 54.243.161.145 54.243.161.145
                  Source: Joe Sandbox ViewIP Address: 54.243.161.145 54.243.161.145
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS traffic detected: queries for: activeheat.co.vu
                  Source: guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: guy2.exe, 00000001.00000002.485266825.000000000361B000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479155669.0000000003205000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpString found in binary or memory: http://activeheat.co.vu
                  Source: guy2.exe, 00000001.00000002.490071746.0000000006D50000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479155669.0000000003205000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: guy2.exe, 00000001.00000003.450271040.00000000012F1000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.488287794.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: guy2.exe, 00000001.00000003.450271040.00000000012F1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479155669.0000000003205000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: guy2.exe, 00000001.00000003.445751971.0000000001301000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                  Source: xQxAsve.exe, 00000012.00000002.487451855.00000000070B0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthofM
                  Source: guy2.exe, 00000001.00000002.490167943.0000000006DAC000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.487451855.00000000070B0000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: guy2.exe, 00000001.00000002.490071746.0000000006D50000.00000004.00000001.sdmp, guy2.exe, 00000001.00000003.445751971.0000000001301000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.487451855.00000000070B0000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: guy2.exe, 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmp, guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.301983864.0000000002551000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000013.00000002.323785393.0000000002551000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://wzhNVX.com
                  Source: guy2.exe, 00000001.00000002.484527766.00000000035B9000.00000004.00000001.sdmpString found in binary or memory: https://VHlE1Bk1DRzqSW.net
                  Source: guy2.exe, 00000001.00000002.484527766.00000000035B9000.00000004.00000001.sdmpString found in binary or memory: https://VHlE1Bk1DRzqSW.net(
                  Source: guy2.exe, 00000001.00000003.443028222.00000000013A4000.00000004.00000001.sdmpString found in binary or memory: https://VHlE1Bk1DRzqSW.net853321935-2125563209-4053062332-1002_Classes
                  Source: guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpString found in binary or memory: https://activeheat.co.vu
                  Source: guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpString found in binary or memory: https://activeheat.co.vu/dek/inc/f08405615b33f6.php
                  Source: xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://activeheat.co.vu/dek/inc/f08405615b33f6.php127.0.0.1POST
                  Source: guy2.exe, 00000001.00000002.484972239.00000000035F9000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpString found in binary or memory: https://activeheat.co.vu4
                  Source: guy2.exe, 00000001.00000002.485479189.0000000003633000.00000004.00000001.sdmpString found in binary or memory: https://activeheat.co.vuD8
                  Source: guy2.exe, 00000001.00000002.480961942.0000000003308000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                  Source: guy2.exe, 00000001.00000002.480961942.0000000003308000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: guy2.exe, 00000001.00000002.480961942.0000000003308000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org4
                  Source: xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                  Source: guy2.exe, 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, guy2.exe, 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                  Source: guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                  Source: guy2.exe, 00000001.00000002.490167943.0000000006DAC000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.487451855.00000000070B0000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: guy2.exe, 00000001.00000003.445751971.0000000001301000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: guy2.exe, 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, guy2.exe, 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745

                  Key, Mouse, Clipboard, Microphone and Screen Capturing:

                  barindex
                  Installs a global keyboard hookShow sources
                  Source: C:\Users\user\Desktop\guy2.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\guy2.exeJump to behavior
                  Source: xQxAsve.exe, 0000000E.00000002.301037246.00000000007C8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                  Source: C:\Users\user\Desktop\guy2.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow created: window name: CLIPBRDWNDCLASS
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_031FC1240_2_031FC124
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_031FE5700_2_031FE570
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_031FE5630_2_031FE563
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C15B580_2_09C15B58
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C182840_2_09C18284
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C175710_2_09C17571
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C17A740_2_09C17A74
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C130D60_2_09C130D6
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C175C80_2_09C175C8
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C156D80_2_09C156D8
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0135A1201_2_0135A120
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0135C1281_2_0135C128
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013570181_2_01357018
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0135C8681_2_0135C868
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013558881_2_01355888
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_01351E581_2_01351E58
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013595681_2_01359568
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013500401_2_01350040
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013544D81_2_013544D8
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0135E2701_2_0135E270
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0135AEE01_2_0135AEE0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013605201_2_01360520
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_01361FA01_2_01361FA0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013649E71_2_013649E7
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_01362BE81_2_01362BE8
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013674301_2_01367430
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013698281_2_01369828
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0136ACB01_2_0136ACB0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_01360CA01_2_01360CA0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0136F6FA1_2_0136F6FA
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013678C01_2_013678C0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0136F7081_2_0136F708
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_013678A51_2_013678A5
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_018939A41_2_018939A4
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0189BAE01_2_0189BAE0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0189B0541_2_0189B054
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_031648601_2_03164860
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_031655301_2_03165530
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_03163D8C1_2_03163D8C
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_031647701_2_03164770
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_031647D31_2_031647D3
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_031648531_2_03164853
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_031655501_2_03165550
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0316DBC11_2_0316DBC1
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_03163D801_2_03163D80
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_007BC12414_2_007BC124
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_007BE57014_2_007BE570
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_007BE56114_2_007BE561
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A3828414_2_08A38284
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A35B5814_2_08A35B58
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A3757114_2_08A37571
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A330D614_2_08A330D6
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A37A7414_2_08A37A74
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A35B4914_2_08A35B49
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A375BF14_2_08A375BF
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A356C914_2_08A356C9
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A356D814_2_08A356D8
                  Source: guy2.exe, 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMARCUS.dll4 vs guy2.exe
                  Source: guy2.exe, 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs guy2.exe
                  Source: guy2.exe, 00000000.00000000.201740870.0000000000F40000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameOS.exe2 vs guy2.exe
                  Source: guy2.exe, 00000000.00000002.219374075.0000000003351000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSKPDPYhBZPpwWDqeaPRKRIbBjj.exe4 vs guy2.exe
                  Source: guy2.exe, 00000001.00000002.475807185.0000000001330000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs guy2.exe
                  Source: guy2.exe, 00000001.00000002.479329361.0000000001740000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs guy2.exe
                  Source: guy2.exe, 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameSKPDPYhBZPpwWDqeaPRKRIbBjj.exe4 vs guy2.exe
                  Source: guy2.exe, 00000001.00000002.474642665.0000000000FA8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs guy2.exe
                  Source: guy2.exe, 00000001.00000000.217669428.0000000000E10000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameOS.exe2 vs guy2.exe
                  Source: guy2.exe, 00000001.00000002.479267716.0000000001730000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs guy2.exe
                  Source: guy2.exeBinary or memory string: OriginalFilenameOS.exe2 vs guy2.exe
                  Source: guy2.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: xQxAsve.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@17/5@7/3
                  Source: C:\Users\user\Desktop\guy2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\guy2.exe.logJump to behavior
                  Source: guy2.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\guy2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\guy2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\guy2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: guy2.exeVirustotal: Detection: 58%
                  Source: guy2.exeReversingLabs: Detection: 43%
                  Source: C:\Users\user\Desktop\guy2.exeFile read: C:\Users\user\Desktop\guy2.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\guy2.exe 'C:\Users\user\Desktop\guy2.exe'
                  Source: unknownProcess created: C:\Users\user\Desktop\guy2.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe 'C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe'
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe 'C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe'
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}
                  Source: C:\Users\user\Desktop\guy2.exeProcess created: C:\Users\user\Desktop\guy2.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: guy2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: guy2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                  Data Obfuscation:

                  barindex
                  .NET source code contains potential unpackerShow sources
                  Source: guy2.exe, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.2.guy2.exe.ec0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.0.guy2.exe.ec0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: xQxAsve.exe.1.dr, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 1.0.guy2.exe.d90000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 1.2.guy2.exe.d90000.1.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 14.2.xQxAsve.exe.c0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 14.0.xQxAsve.exe.c0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 15.2.xQxAsve.exe.1f0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 15.0.xQxAsve.exe.1f0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 16.2.xQxAsve.exe.2c0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 16.0.xQxAsve.exe.2c0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.xQxAsve.exe.130000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.xQxAsve.exe.130000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 18.0.xQxAsve.exe.ce0000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 18.2.xQxAsve.exe.ce0000.1.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 19.0.xQxAsve.exe.10000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 19.2.xQxAsve.exe.10000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 20.0.xQxAsve.exe.320000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 20.2.xQxAsve.exe.320000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 22.0.xQxAsve.exe.c80000.0.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 22.2.xQxAsve.exe.c80000.1.unpack, SimpleTextEditor/LoginForm.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_00EC81C9 push 00000000h; iretd 0_2_00EC82A0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_00EC8CC6 push ss; iretd 0_2_00EC8CE6
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_00EC8CDF push ss; iretd 0_2_00EC8CE6
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_031FF933 push eax; iretd 0_2_031FF939
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C1C13D push FFFFFF8Bh; iretd 0_2_09C1C13F
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C1C027 push dword ptr [ebx+ebp-75h]; iretd 0_2_09C1C04D
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C1174D pushad ; iretd 0_2_09C11751
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 0_2_09C1073D push ecx; ret 0_2_09C1073E
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_00D98CDF push ss; iretd 1_2_00D98CE6
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_00D981C9 push 00000000h; iretd 1_2_00D982A0
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_00D98CC6 push ss; iretd 1_2_00D98CE6
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_0136DC30 push esp; iretd 1_2_0136DC31
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_018960A0 pushad ; ret 1_2_018960A1
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_000C81C9 push 00000000h; iretd 14_2_000C82A0
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_000C8CC6 push ss; iretd 14_2_000C8CE6
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_000C8CDF push ss; iretd 14_2_000C8CE6
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_007BF932 push eax; iretd 14_2_007BF939
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A3C13D push FFFFFF8Bh; iretd 14_2_08A3C13F
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A3073D push ecx; ret 14_2_08A3073E
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 14_2_08A3174D pushad ; iretd 14_2_08A31751
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 15_2_001F8CDF push ss; iretd 15_2_001F8CE6
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 15_2_001F81C9 push 00000000h; iretd 15_2_001F82A0
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 15_2_001F8CC6 push ss; iretd 15_2_001F8CE6
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 16_2_002C81C9 push 00000000h; iretd 16_2_002C82A0
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 16_2_002C8CC6 push ss; iretd 16_2_002C8CE6
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeCode function: 16_2_002C8CDF push ss; iretd 16_2_002C8CE6
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.73806831255
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.73806831255
                  Source: C:\Users\user\Desktop\guy2.exeFile created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeJump to dropped file
                  Source: C:\Users\user\Desktop\guy2.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run xQxAsveJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run xQxAsveJump to behavior

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Moves itself to temp directoryShow sources
                  Source: c:\users\user\desktop\guy2.exeFile moved: C:\Users\user\AppData\Local\Temp\tmpG946.tmpJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM_3Show sources
                  Source: Yara matchFile source: 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.302094753.0000000002593000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.323785393.0000000002551000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6864, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: guy2.exe PID: 5980, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6628, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\guy2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\guy2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: guy2.exe, 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.303263725.00000000028F1000.00000004.00000001.sdmp, xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: guy2.exe, 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.303263725.00000000028F1000.00000004.00000001.sdmp, xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\guy2.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\guy2.exeWindow / User API: threadDelayed 1957Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeWindow / User API: threadDelayed 1590Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeWindow / User API: threadDelayed 8268Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 427Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 4292Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 1750Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 8101Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 703Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 1478Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 2916
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWindow / User API: threadDelayed 6927
                  Source: C:\Users\user\Desktop\guy2.exe TID: 3512Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exe TID: 5348Thread sleep time: -41500s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exe TID: 4112Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exe TID: 1276Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exe TID: 5260Thread sleep count: 1590 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exe TID: 5260Thread sleep count: 8268 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6748Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6632Thread sleep time: -41500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6716Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 1328Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 1320Thread sleep count: 1750 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 1320Thread sleep count: 8101 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6900Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6868Thread sleep time: -41500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6888Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 1784Thread sleep time: -27670116110564310s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6544Thread sleep count: 2916 > 30
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe TID: 6544Thread sleep count: 6927 > 30
                  Source: C:\Users\user\Desktop\guy2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMware
                  Source: guy2.exe, 00000001.00000002.490071746.0000000006D50000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll <
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: xQxAsve.exe, 00000013.00000002.326074194.00000000028B1000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\guy2.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeCode function: 1_2_01357018 LdrInitializeThunk,1_2_01357018
                  Source: C:\Users\user\Desktop\guy2.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\guy2.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Injects a PE file into a foreign processesShow sources
                  Source: C:\Users\user\Desktop\guy2.exeMemory written: C:\Users\user\Desktop\guy2.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeMemory written: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeMemory written: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeProcess created: C:\Users\user\Desktop\guy2.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeProcess created: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe {path}Jump to behavior
                  Source: guy2.exe, 00000001.00000002.479905017.0000000001CB0000.00000002.00000001.sdmp, xQxAsve.exe, 00000012.00000002.477983352.0000000001B90000.00000002.00000001.sdmp, xQxAsve.exe, 00000016.00000002.478963860.0000000001990000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: guy2.exe, 00000001.00000002.479905017.0000000001CB0000.00000002.00000001.sdmp, xQxAsve.exe, 00000012.00000002.477983352.0000000001B90000.00000002.00000001.sdmp, xQxAsve.exe, 00000016.00000002.478963860.0000000001990000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: guy2.exe, 00000001.00000002.479905017.0000000001CB0000.00000002.00000001.sdmp, xQxAsve.exe, 00000012.00000002.477983352.0000000001B90000.00000002.00000001.sdmp, xQxAsve.exe, 00000016.00000002.478963860.0000000001990000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: guy2.exe, 00000001.00000002.479905017.0000000001CB0000.00000002.00000001.sdmp, xQxAsve.exe, 00000012.00000002.477983352.0000000001B90000.00000002.00000001.sdmp, xQxAsve.exe, 00000016.00000002.478963860.0000000001990000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Users\user\Desktop\guy2.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Users\user\Desktop\guy2.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\guy2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6864, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6796, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: guy2.exe PID: 5980, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 7020, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: guy2.exe PID: 3544, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6628, type: MEMORY
                  Source: Yara matchFile source: 18.2.xQxAsve.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.guy2.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.xQxAsve.exe.400000.0.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\guy2.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\guy2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6796, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 7020, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: guy2.exe PID: 3544, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6864, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6796, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: guy2.exe PID: 5980, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 7020, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: guy2.exe PID: 3544, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xQxAsve.exe PID: 6628, type: MEMORY
                  Source: Yara matchFile source: 18.2.xQxAsve.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.guy2.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.xQxAsve.exe.400000.0.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Obfuscated Files or Information3Input Capture111Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing13Credentials in Registry1Security Software Discovery311SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading11NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput Capture111Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion13LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection112Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Network Configuration Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 323572 Sample: guy2.exe Startdate: 27/11/2020 Architecture: WINDOWS Score: 100 51 Multi AV Scanner detection for submitted file 2->51 53 Yara detected AgentTesla 2->53 55 Yara detected AntiVM_3 2->55 57 3 other signatures 2->57 6 guy2.exe 3 2->6         started        10 xQxAsve.exe 3 2->10         started        12 xQxAsve.exe 2 2->12         started        process3 file4 31 C:\Users\user\AppData\Local\...\guy2.exe.log, ASCII 6->31 dropped 59 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->59 61 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->61 63 Injects a PE file into a foreign processes 6->63 14 guy2.exe 17 9 6->14         started        65 Multi AV Scanner detection for dropped file 10->65 19 xQxAsve.exe 14 2 10->19         started        21 xQxAsve.exe 10->21         started        23 xQxAsve.exe 10->23         started        25 xQxAsve.exe 10->25         started        27 xQxAsve.exe 12->27         started        29 xQxAsve.exe 12->29         started        signatures5 process6 dnsIp7 37 activeheat.co.vu 80.85.159.36, 443, 49731, 49742 CHELYABINSK-SIGNAL-ASRU Russian Federation 14->37 39 elb097307-934924932.us-east-1.elb.amazonaws.com 54.243.161.145, 443, 49747 AMAZON-AESUS United States 14->39 41 3 other IPs or domains 14->41 33 C:\Users\user\AppData\Roaming\...\xQxAsve.exe, PE32 14->33 dropped 35 C:\Users\user\...\xQxAsve.exe:Zone.Identifier, ASCII 14->35 dropped 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->43 45 Moves itself to temp directory 14->45 47 Tries to steal Mail credentials (via file access) 14->47 49 4 other signatures 14->49 file8 signatures9

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  guy2.exe59%VirustotalBrowse
                  guy2.exe44%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe44%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  18.2.xQxAsve.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  1.2.guy2.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  22.2.xQxAsve.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  https://VHlE1Bk1DRzqSW.net853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                  https://VHlE1Bk1DRzqSW.net0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://api.ipify.org40%Avira URL Cloudsafe
                  https://VHlE1Bk1DRzqSW.net(0%Avira URL Cloudsafe
                  http://wzhNVX.com0%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  https://activeheat.co.vuD80%Avira URL Cloudsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  https://activeheat.co.vu40%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  activeheat.co.vu
                  80.85.159.36
                  truefalse
                    high
                    elb097307-934924932.us-east-1.elb.amazonaws.com
                    54.243.161.145
                    truefalse
                      high
                      api.ipify.org
                      unknown
                      unknownfalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.fontbureau.com/designersGguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bTheguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                              high
                              http://www.tiro.comxQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersxQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                high
                                http://www.goodfont.co.krguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://activeheat.co.vuguy2.exe, 00000001.00000002.485266825.000000000361B000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479155669.0000000003205000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpfalse
                                  high
                                  https://api.ipify.orgGETMozilla/5.0xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/cTheguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://api.ipify.orgguy2.exe, 00000001.00000002.480961942.0000000003308000.00000004.00000001.sdmpfalse
                                    high
                                    http://fontfabrik.comguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://VHlE1Bk1DRzqSW.net853321935-2125563209-4053062332-1002_Classesguy2.exe, 00000001.00000003.443028222.00000000013A4000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low
                                    https://activeheat.co.vuguy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpfalse
                                      high
                                      https://VHlE1Bk1DRzqSW.netguy2.exe, 00000001.00000002.484527766.00000000035B9000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fonts.comguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.sandoll.co.krguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleaseguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameguy2.exe, 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmp, guy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.301983864.0000000002551000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000013.00000002.323785393.0000000002551000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.sakkal.comguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipguy2.exe, 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, guy2.exe, 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org/guy2.exe, 00000001.00000002.480961942.0000000003308000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.apache.org/licenses/LICENSE-2.0guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.comguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                high
                                                http://DynDns.comDynDNSxQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://sectigo.com/CPS0guy2.exe, 00000001.00000002.490167943.0000000006DAC000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.487451855.00000000070B0000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480320849.00000000030D5000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haguy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://api.ipify.org4guy2.exe, 00000001.00000002.480961942.0000000003308000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://VHlE1Bk1DRzqSW.net(guy2.exe, 00000001.00000002.484527766.00000000035B9000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                http://wzhNVX.comxQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.carterandcone.comlguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://activeheat.co.vuD8guy2.exe, 00000001.00000002.485479189.0000000003633000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers/cabarga.htmlNguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                  high
                                                  http://www.founder.com.cn/cnguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://activeheat.co.vu4guy2.exe, 00000001.00000002.484972239.00000000035F9000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/frere-jones.htmlguy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                    high
                                                    https://activeheat.co.vu/dek/inc/f08405615b33f6.php127.0.0.1POSTxQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://api.telegram.org/bot%telegramapi%/guy2.exe, 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, guy2.exe, 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, xQxAsve.exe, 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmpfalse
                                                        high
                                                        http://www.jiyu-kobo.co.jp/guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers8guy2.exe, 00000000.00000002.224276106.00000000063D0000.00000002.00000001.sdmp, xQxAsve.exe, 0000000E.00000002.305542757.00000000054C0000.00000002.00000001.sdmp, xQxAsve.exe, 00000013.00000002.331803714.00000000054E0000.00000002.00000001.sdmpfalse
                                                          high
                                                          https://activeheat.co.vu/dek/inc/f08405615b33f6.phpguy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.479040941.00000000031E8000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.480129247.00000000030B8000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://secure.comodo.com/CPS0guy2.exe, 00000001.00000003.445751971.0000000001301000.00000004.00000001.sdmpfalse
                                                              high
                                                              https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xguy2.exe, 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, xQxAsve.exe, 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, xQxAsve.exe, 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmpfalse
                                                                high

                                                                Contacted IPs

                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs

                                                                Public

                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                54.243.161.145
                                                                unknownUnited States
                                                                14618AMAZON-AESUSfalse
                                                                80.85.159.36
                                                                unknownRussian Federation
                                                                44493CHELYABINSK-SIGNAL-ASRUfalse

                                                                Private

                                                                IP
                                                                192.168.2.1

                                                                General Information

                                                                Joe Sandbox Version:31.0.0 Red Diamond
                                                                Analysis ID:323572
                                                                Start date:27.11.2020
                                                                Start time:06:34:22
                                                                Joe Sandbox Product:CloudBasic
                                                                Overall analysis duration:0h 12m 7s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Sample file name:guy2.exe
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                Number of analysed new started processes analysed:31
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • HDC enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@17/5@7/3
                                                                EGA Information:Failed
                                                                HDC Information:Failed
                                                                HCA Information:
                                                                • Successful, ratio: 100%
                                                                • Number of executed functions: 94
                                                                • Number of non-executed functions: 5
                                                                Cookbook Comments:
                                                                • Adjust boot time
                                                                • Enable AMSI
                                                                • Found application associated with file extension: .exe
                                                                Warnings:
                                                                Show All
                                                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                                                • Excluded IPs from analysis (whitelisted): 13.88.21.125, 52.255.188.83, 168.61.161.212, 51.104.139.180, 2.20.84.85, 20.54.26.129, 2.20.142.209, 2.20.142.210, 92.122.213.194, 92.122.213.247, 204.79.197.200, 13.107.21.200
                                                                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, audownload.windowsupdate.nsatc.net, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                                Simulations

                                                                Behavior and APIs

                                                                TimeTypeDescription
                                                                06:35:16API Interceptor735x Sleep call for process: guy2.exe modified
                                                                06:35:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run xQxAsve C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                06:35:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run xQxAsve C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                06:35:52API Interceptor919x Sleep call for process: xQxAsve.exe modified

                                                                Joe Sandbox View / Context

                                                                IPs

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                54.243.161.1451125_56873981.docGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                REQUEST FOR QUOTATION-6container.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                Request for Quote.docGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                fw314FjnwM.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                mT4sVN5EMN.exeGet hashmaliciousBrowse
                                                                • api.ipify.orghttp://api.ipify.org/?format=json
                                                                SecuriteInfo.com.ArtemisA49347BCE7B1.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                JwzZ6mkzIG.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                scandocuments_pdf.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                RFQ_NEW029287652267.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                Delivery Note - AWD 200038485852- 234920301190.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                chibuike17.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                file.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                5fNtovgDmX.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                0Cnb8v0C53.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/?format=xml
                                                                P9OFS5NEj0.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/?format=xml
                                                                VRRh2DUTnA.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/?format=xml
                                                                Payment.exeGet hashmaliciousBrowse
                                                                • api.ipify.org/
                                                                80.85.159.36Cs8BfAoDKm.exeGet hashmaliciousBrowse
                                                                  GDRw7Y75g7.exeGet hashmaliciousBrowse
                                                                    XyCyrhKd87.exeGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      elb097307-934924932.us-east-1.elb.amazonaws.comPO_0012009.xlsxGet hashmaliciousBrowse
                                                                      • 23.21.252.4
                                                                      5C.exeGet hashmaliciousBrowse
                                                                      • 54.225.169.28
                                                                      INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                      • 54.225.66.103
                                                                      #A06578987.xlsmGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      SecuriteInfo.com.Variant.Bulz.233365.3916.exeGet hashmaliciousBrowse
                                                                      • 23.21.252.4
                                                                      https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                                                      • 54.225.169.28
                                                                      INVOICE.xlsxGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      Inquiry_pdf.exeGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      98650107.pdf.exeGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      1125_56873981.docGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                                                      • 54.235.142.93
                                                                      ER mexico.exeGet hashmaliciousBrowse
                                                                      • 54.235.83.248
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                                                      • 54.243.164.148
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.6057.exeGet hashmaliciousBrowse
                                                                      • 50.19.252.36
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.7042.exeGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.30157.exeGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      SecuriteInfo.com.Trojan.PackedNET.469.31999.exeGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      Cs8BfAoDKm.exeGet hashmaliciousBrowse
                                                                      • 54.235.83.248
                                                                      activeheat.co.vuCs8BfAoDKm.exeGet hashmaliciousBrowse
                                                                      • 80.85.159.36

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      AMAZON-AESUShttps://34.75.2o2.lol/XYWNc0aW9uPWwNsaWNrJngVybD1ovndHRwnczovL3NleY3wVyZWQtbG9naW4ubmV0nL3BhZ2VzLzQyY2FkNTJhZmU3YSZyZWNpcGllbnRfaWQ9NzM2OTg3ODg4JmNhbXBhaWduX3J1bl9pZD0zOTM3OTczGet hashmaliciousBrowse
                                                                      • 3.215.226.95
                                                                      https://bit.do/fLpprGet hashmaliciousBrowse
                                                                      • 54.83.52.76
                                                                      PO_0012009.xlsxGet hashmaliciousBrowse
                                                                      • 23.21.252.4
                                                                      https://webnavigator.co/?adprovider=AppFocus1&source=d-cp11560482685&group=cg60&device=c&keyword=&creative=477646941053&adposition=none&placement=www.123homeschool4me.com&target=segment_be_a_7802457135858218830&sl=&caid=11560482685&gw=1&test=%3a%2f%2fmailGet hashmaliciousBrowse
                                                                      • 54.90.26.145
                                                                      https://m365.eu.vadesecure.com/safeproxy/v4?f=xQsVwKRZoQHMcJWN90zqnir6G6pZJkmZJBUJoNEfoN5w0NIk94-OeCH1NldcAqKsz75KalR9dIZlPCJr1Ux0xQ&i=dKwbScfh0hAXC0Inkkq0sM5FeXPK9I7Ny4D2nAPOiEibKJwP2etJDqX8WzAoEu0mklzE6wT-r8I8OtTRdIg8Sg&k=EPqM&r=_vxI1MPLJP9RjHYc6dmEH2aQYLnm7iSEcU9gx_WNg2_vrJo8MeAqNzNCqHX9DNrQ&s=dbc75c7ed54466f34eeae3fd3b1612b20fb815efc99933570f78acd79467623c&u=https%3A%2F%2Femail.utest.com%2Fls%2Fclick%3Fupn%3DlGjzeq3i4yih7CYyWDD2uGWEioaO303Ya1CTzgGY6ZFHmgV-2FF-2FEWXdAYvLiLIvET2r-2BfuQ5qIL56xFMZkA-2F-2BXKhuWb2hSemZwMxFmG0rDjjP9tlrcROzWmQSAh2kMQamb79I1cx4-2Fvjhww3n8oZQi-2FnOhlQdbGdNxKrX28q7P-2FPufa0AAvr-2FvNJcD-2FrxpMHjDG9dPJU0WEGqi12uVZQLCz-2BjYAJF5yCzK-2FjUezEn2d6sv-2BTETl96ejjfG9yQ2VbdWqGp_snpiKdUCY2bDrEnMsWMAnz6f3HkWPd0oUIj3WsKz0V4NahNEm-2BJ9rDW2-2Fib8wsclxoRuHsrv-2B0aoCVw0ftXwGZJTPgQ4k6DZXQjAqFeejOYe-2FRbaSc1Yf5Xj5PUa6lKqmFYNWSkevePONwyMaBGxV4NDGtgMbAc7jyOEWYDUniHPiY87Lpiw631423FED14OvXIfrL7S45QvDvK6-2Fc04r-2B65lMxyCebYSr-2FOr4bCpGQ-3DGet hashmaliciousBrowse
                                                                      • 52.202.11.207
                                                                      https://webmail-re5rere.web.app/?emailtoken=test@test.com&domain=test.comGet hashmaliciousBrowse
                                                                      • 34.236.142.3
                                                                      5C.exeGet hashmaliciousBrowse
                                                                      • 54.225.169.28
                                                                      INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                      • 54.225.66.103
                                                                      #A06578987.xlsmGet hashmaliciousBrowse
                                                                      • 54.204.14.42
                                                                      https://email.utest.com/ls/click?upn=kHi9kJ2VFJGMl00Uc0lXdd7WKRMGsOIU4g4ei1d-2FX5m1QA-2FrT8Vl5L3Fk3cMytK6G9se1iMMnmCZDn1xIdrYiQ1p-2FwcQpvha0Cl5oPF0v81y5hgAsim7OqaA63T8LZn1UUJIEgydRUHiWwDj8GYDCxqGnV0O0rI4O7I6kSKWwA2QN6GRUB5jtLYkPnKAtjOoUgEhfuSimn9pHS78TURJ3gh4c37fJ5SLcFsdSMlL5cSNM599TAmyU83RYL5vT6LiS59Z_K8t8bbLaByOBk98eoL7OiHjGcOStuW9cK4Z47GjL3LOg6J63-2FMkWRpNoPmcLIu18HCMEgODcyx-2FUvVhPVIvmHjzJiqJBCjoeBbWoJaKrxsvgnkh140XYi8oSb4fB3DPwhOq9ho1ZQ40V7Ij7E76nndroD8i7Zx6K9k23tLqOPU-2BI4uv4B0Gy5ZNEnpZd7wg2RXwXNiQ76annNuw-2BlzoA5-2FGihgJE5sZwqDaPnA1XR7c-3DGet hashmaliciousBrowse
                                                                      • 52.202.11.207
                                                                      http://pma.climabitus.com/undercook.phpGet hashmaliciousBrowse
                                                                      • 23.20.225.204
                                                                      https://brechi5.wixsite.com/owa-webmail-updatesGet hashmaliciousBrowse
                                                                      • 52.2.188.208
                                                                      https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                                                      • 52.205.236.122
                                                                      PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      Inquiry_pdf.exeGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      98650107.pdf.exeGet hashmaliciousBrowse
                                                                      • 23.21.42.25
                                                                      #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                      • 174.129.214.20
                                                                      http://searchlf.comGet hashmaliciousBrowse
                                                                      • 34.196.190.195
                                                                      https://pembina.sharepoint.com/teams/BOandP/_layouts/15/guestaccess.aspx?share=Ev8UHcgPkQRPnPpDIa8PTeUBDnUZj2epg0IcLzD6O0XQNQ&e=5:GyiSQ3&at=9Get hashmaliciousBrowse
                                                                      • 50.16.119.144
                                                                      https://omgzone.co.uk/Get hashmaliciousBrowse
                                                                      • 3.225.133.96
                                                                      CHELYABINSK-SIGNAL-ASRUCs8BfAoDKm.exeGet hashmaliciousBrowse
                                                                      • 80.85.159.36
                                                                      GDRw7Y75g7.exeGet hashmaliciousBrowse
                                                                      • 80.85.159.36
                                                                      XyCyrhKd87.exeGet hashmaliciousBrowse
                                                                      • 80.85.159.36
                                                                      order updated Dwg for new order-100920-0086.exeGet hashmaliciousBrowse
                                                                      • 185.118.165.47
                                                                      Invoice No. 26647.exeGet hashmaliciousBrowse
                                                                      • 185.118.165.47
                                                                      file.11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.118
                                                                      file.11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.118
                                                                      require-11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      file.11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.118
                                                                      require-11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      require-11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      dictate-11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      decree 11.04.2020.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      dictate-11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      dictate-11.20.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      decree 11.04.2020.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      decree 11.04.2020.docGet hashmaliciousBrowse
                                                                      • 185.118.167.183
                                                                      kDxFrV4k9U.exeGet hashmaliciousBrowse
                                                                      • 80.85.156.116
                                                                      certificate_010.19.2020.docGet hashmaliciousBrowse
                                                                      • 80.85.158.53
                                                                      certificate_010.19.2020.docGet hashmaliciousBrowse
                                                                      • 80.85.158.53

                                                                      JA3 Fingerprints

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      3b5074b1b5d032e5620f69f9f700ff0eExodus.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      #A06578987.xlsmGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      Order 51897.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      98650107.pdf.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      Izezma64.dllGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      fuxenm32.dllGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      http://ancien-site-joomla.fr/build2.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      ER mexico.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.6057.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      SecuriteInfo.com.ArtemisTrojan.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.7042.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.30157.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      SecuriteInfo.com.Trojan.PackedNET.469.31999.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      Cs8BfAoDKm.exeGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36
                                                                      RFQ URGENT NEW ORDER#001_XLS.EXEGet hashmaliciousBrowse
                                                                      • 54.243.161.145
                                                                      • 80.85.159.36

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\guy2.exe.log
                                                                      Process:C:\Users\user\Desktop\guy2.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1301
                                                                      Entropy (8bit):5.345637324625647
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                      MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                      SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                      SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                      SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                      Malicious:true
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xQxAsve.exe.log
                                                                      Process:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1301
                                                                      Entropy (8bit):5.345637324625647
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                      MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                      SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                      SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                      SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      C:\Users\user\AppData\Roaming\th3yaotv.tsz\Chrome\Default\Cookies
                                                                      Process:C:\Users\user\Desktop\guy2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                      Category:modified
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.6970840431455908
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                                                      MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                                                      SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                                                      SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                                                      SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Process:C:\Users\user\Desktop\guy2.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):510976
                                                                      Entropy (8bit):7.72947163728595
                                                                      Encrypted:false
                                                                      SSDEEP:12288:61b4JO3PrN2iN865O/Tw2dXiQSb8gWT60VDZGht8LF:gb4JO3jN1S55dXib8gV05Zq8
                                                                      MD5:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      SHA1:FF10833C4BA57938F94C41B75D824AC9E8FE36B4
                                                                      SHA-256:D8E273754006EB7118BE058C46EFEF0A1B20AE4929DAD75ECFED1AE1AAE0C0EB
                                                                      SHA-512:A73FEA650D5E09338C8792BA22FBC530627C1DCA735630065DB8D1B63DC8B76F69D23DFEC492CA123148BA414464D9FD4EEBDB0DD3B0CDC083E57191C636F720
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 44%
                                                                      Reputation:low
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....u._..............0.................. ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H........r...c......x...D...@............................................0..G.........}.....(.......(......s....}.....{.....o.....(......{.....{....o.....*..0...........(.....{....{....(.......(....~....vl....,..{....{....o......{....{.....o....o......{....(....}.....o......3..{....{....o.......+....,@..{....{....o....s......{.....{....{....o......{....{....o......*...{....( ...o!.....{....~....o"....*...{....(#...o!.....{....~....o"....*...0..+.........,..{.......+....,...{.
                                                                      C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe:Zone.Identifier
                                                                      Process:C:\Users\user\Desktop\guy2.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview: [ZoneTransfer]....ZoneId=0

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.72947163728595
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      File name:guy2.exe
                                                                      File size:510976
                                                                      MD5:a0e65c4d3bc5fb564f82fe66ab228044
                                                                      SHA1:ff10833c4ba57938f94c41b75d824ac9e8fe36b4
                                                                      SHA256:d8e273754006eb7118be058c46efef0a1b20ae4929dad75ecfed1ae1aae0c0eb
                                                                      SHA512:a73fea650d5e09338c8792ba22fbc530627c1dca735630065db8d1b63dc8b76f69d23dfec492ca123148ba414464d9fd4eebdb0dd3b0cdc083e57191c636f720
                                                                      SSDEEP:12288:61b4JO3PrN2iN865O/Tw2dXiQSb8gWT60VDZGht8LF:gb4JO3jN1S55dXib8gV05Zq8
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....u._..............0.................. ........@.. .......................@............@................................

                                                                      File Icon

                                                                      Icon Hash:00828e8e8686b000

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x47e0d6
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x5FBF75EB [Thu Nov 26 09:31:23 2020 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7e0840x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x800000x5b8.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x820000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x7c0dc0x7c200False0.837542484894COM executable for DOS7.73806831255IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x800000x5b80x600False0.429036458333data4.09670187577IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x820000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x800900x328data
                                                                      RT_MANIFEST0x803c80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightCopyright 2016 - 2020
                                                                      Assembly Version1.0.0.0
                                                                      InternalNameOS.exe
                                                                      FileVersion1.0.0.0
                                                                      CompanyNameVendetta Inc.
                                                                      LegalTrademarks
                                                                      Comments
                                                                      ProductNameAku Form
                                                                      ProductVersion1.0.0.0
                                                                      FileDescriptionAku Form
                                                                      OriginalFilenameOS.exe

                                                                      Network Behavior

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 27, 2020 06:35:42.780715942 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:42.869282961 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:42.869483948 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:42.940324068 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.032150984 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.032182932 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.032196999 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.032208920 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.032222033 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.032232046 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.032341957 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.090656042 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.178728104 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.218417883 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.430408001 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.520558119 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.562222004 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.674767971 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:43.783885956 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.788064957 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:43.788158894 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:35:48.789292097 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:48.789359093 CET4434973180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:35:48.792985916 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.561378956 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.646553040 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.646697044 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.738228083 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.822659969 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.823120117 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.823177099 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.823220968 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.823236942 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.823250055 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.823308945 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.826543093 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.831581116 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:25.916596889 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:25.956355095 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.043056011 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.130143881 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.131346941 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.162440062 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.227655888 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.231195927 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.231350899 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.250801086 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.251027107 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.308250904 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.396351099 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.397814035 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.397836924 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.397854090 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.397866964 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.398065090 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.398099899 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.402324915 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.408324957 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.497232914 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.550127029 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.596128941 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.687160015 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.690042973 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:26.788806915 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.794173956 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:26.794421911 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:31.236711025 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:31.236762047 CET4434974280.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:31.236824989 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:31.800113916 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:31.800463915 CET4434974380.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:31.800681114 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:43.995280027 CET49731443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:43.996757984 CET49745443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:44.082891941 CET4434974580.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:36:44.082979918 CET49745443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:36:56.603790998 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.706784964 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.706906080 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.707495928 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.810539007 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.810589075 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.810622931 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.810655117 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.810683012 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.810708046 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.810766935 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.811727047 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.835602045 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.938765049 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:56.990135908 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:56.994956017 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:36:57.100821972 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:36:57.146384954 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:37:05.639552116 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:37:05.743084908 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:37:05.743105888 CET4434974754.243.161.145192.168.2.3
                                                                      Nov 27, 2020 06:37:05.743189096 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:37:05.743263960 CET49747443192.168.2.354.243.161.145
                                                                      Nov 27, 2020 06:37:06.021018982 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:06.108247042 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:06.108345032 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:06.108829975 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:06.196046114 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:06.196552992 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:06.240966082 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:06.257435083 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:06.347079039 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:06.348179102 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:06.464416027 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:06.468575954 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:06.468668938 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:07.453743935 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:07.544148922 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:07.544672966 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:07.632036924 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:07.726088047 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:07.738105059 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:07.738255024 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:07.738912106 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:07.826733112 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:07.826764107 CET4434974880.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:07.826966047 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:07.827112913 CET49748443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.277601957 CET49742443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.277832985 CET49750443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.363892078 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.363986015 CET49750443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.364357948 CET49750443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.450216055 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.453151941 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.455755949 CET49750443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.554299116 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.557708025 CET49750443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.683433056 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.696154118 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.702122927 CET4434975080.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.702263117 CET49750443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.797549963 CET49743443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.798086882 CET49751443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.884464025 CET4434975180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.884747028 CET49751443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.885217905 CET49751443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:26.978769064 CET4434975180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.979607105 CET4434975180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:26.980964899 CET49751443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:27.069942951 CET4434975180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:27.070383072 CET49751443192.168.2.380.85.159.36
                                                                      Nov 27, 2020 06:37:27.197849989 CET4434975180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:27.309498072 CET4434975180.85.159.36192.168.2.3
                                                                      Nov 27, 2020 06:37:27.352101088 CET49751443192.168.2.380.85.159.36

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 27, 2020 06:35:05.527204990 CET6083153192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:05.562722921 CET53608318.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:06.547791004 CET6010053192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:06.583292961 CET53601008.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:07.221653938 CET5319553192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:07.248811960 CET53531958.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:08.337989092 CET5014153192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:08.365093946 CET53501418.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:09.374047041 CET5302353192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:09.401307106 CET53530238.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:10.498193026 CET4956353192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:10.527770996 CET53495638.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:11.553212881 CET5135253192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:11.580805063 CET53513528.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:12.569529057 CET5934953192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:12.604892969 CET53593498.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:13.611418962 CET5708453192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:13.638717890 CET53570848.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:14.659322977 CET5882353192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:14.704514027 CET53588238.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:15.532130957 CET5756853192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:15.559286118 CET53575688.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:16.628631115 CET5054053192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:16.655605078 CET53505408.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:19.816878080 CET5436653192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:19.852576017 CET53543668.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:32.030726910 CET5303453192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:32.057739973 CET53530348.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:39.688111067 CET5776253192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:39.730329037 CET53577628.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:42.558103085 CET5543553192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:42.695727110 CET53554358.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:51.592988014 CET5071353192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:51.643186092 CET53507138.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:35:55.280731916 CET5613253192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:35:55.320084095 CET53561328.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:07.437165022 CET5898753192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:07.464298010 CET53589878.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:11.865447044 CET5657953192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:11.902117014 CET53565798.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:25.307754040 CET6063353192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:25.433378935 CET53606338.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:26.097640991 CET6129253192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:26.133351088 CET53612928.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:42.998397112 CET6361953192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:43.026184082 CET53636198.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:44.377599955 CET6493853192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:44.412810087 CET53649388.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:44.945775032 CET6194653192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:44.991517067 CET53619468.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:56.531215906 CET6491053192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:56.558594942 CET53649108.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:36:56.575598001 CET5212353192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:36:56.602844954 CET53521238.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:37:05.984216928 CET5613053192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:37:06.019807100 CET53561308.8.8.8192.168.2.3
                                                                      Nov 27, 2020 06:37:17.993158102 CET5633853192.168.2.38.8.8.8
                                                                      Nov 27, 2020 06:37:18.020297050 CET53563388.8.8.8192.168.2.3

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Nov 27, 2020 06:35:42.558103085 CET192.168.2.38.8.8.80x9aeeStandard query (0)activeheat.co.vuA (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:25.307754040 CET192.168.2.38.8.8.80x54c6Standard query (0)activeheat.co.vuA (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:26.097640991 CET192.168.2.38.8.8.80x4b05Standard query (0)activeheat.co.vuA (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:44.377599955 CET192.168.2.38.8.8.80xf9d5Standard query (0)activeheat.co.vuA (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.531215906 CET192.168.2.38.8.8.80x4a37Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.575598001 CET192.168.2.38.8.8.80x11b6Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:37:05.984216928 CET192.168.2.38.8.8.80xf43fStandard query (0)activeheat.co.vuA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Nov 27, 2020 06:35:42.695727110 CET8.8.8.8192.168.2.30x9aeeNo error (0)activeheat.co.vu80.85.159.36A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:25.433378935 CET8.8.8.8192.168.2.30x54c6No error (0)activeheat.co.vu80.85.159.36A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:26.133351088 CET8.8.8.8192.168.2.30x4b05No error (0)activeheat.co.vu80.85.159.36A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:44.412810087 CET8.8.8.8192.168.2.30xf9d5No error (0)activeheat.co.vu80.85.159.36A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.558594942 CET8.8.8.8192.168.2.30x4a37No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.182.194A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:36:56.602844954 CET8.8.8.8192.168.2.30x11b6No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.204.14.42A (IP address)IN (0x0001)
                                                                      Nov 27, 2020 06:37:06.019807100 CET8.8.8.8192.168.2.30xf43fNo error (0)activeheat.co.vu80.85.159.36A (IP address)IN (0x0001)

                                                                      HTTPS Packets

                                                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                      Nov 27, 2020 06:35:43.032232046 CET80.85.159.36443192.168.2.349731CN=activeheat.co.vu CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Nov 25 01:00:00 CET 2020 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Wed Feb 24 00:59:59 CET 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                      CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                                                                      CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                                                                      Nov 27, 2020 06:36:25.826543093 CET80.85.159.36443192.168.2.349742CN=activeheat.co.vu CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Nov 25 01:00:00 CET 2020 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Wed Feb 24 00:59:59 CET 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                      CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                                                                      CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                                                                      Nov 27, 2020 06:36:26.402324915 CET80.85.159.36443192.168.2.349743CN=activeheat.co.vu CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Nov 25 01:00:00 CET 2020 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Wed Feb 24 00:59:59 CET 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                      CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                                                                      CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                                                                      Nov 27, 2020 06:36:56.811727047 CET54.243.161.145443192.168.2.349747CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                      CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                                                      CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                                                      Code Manipulations

                                                                      Statistics

                                                                      CPU Usage

                                                                      Click to jump to process

                                                                      Memory Usage

                                                                      Click to jump to process

                                                                      High Level Behavior Distribution

                                                                      Click to dive into process behavior distribution

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:06:35:09
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\Desktop\guy2.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\guy2.exe'
                                                                      Imagebase:0xec0000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.219413063.000000000338F000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.220656712.0000000004351000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:17
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\Desktop\guy2.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0xd90000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.480411054.00000000032B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.468399314.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:50
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe'
                                                                      Imagebase:0xc0000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.303356146.0000000003551000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000E.00000002.302094753.0000000002593000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 44%, ReversingLabs
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:53
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:{path}
                                                                      Imagebase:0x1f0000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:54
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:{path}
                                                                      Imagebase:0x2c0000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:54
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:{path}
                                                                      Imagebase:0x130000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:55
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0xce0000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.468356599.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.478360103.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:35:58
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe'
                                                                      Imagebase:0x10000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.326235962.0000000003511000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.323785393.0000000002551000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:36:03
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:{path}
                                                                      Imagebase:0x320000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      General

                                                                      Start time:06:36:04
                                                                      Start date:27/11/2020
                                                                      Path:C:\Users\user\AppData\Roaming\xQxAsve\xQxAsve.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0xc80000
                                                                      File size:510976 bytes
                                                                      MD5 hash:A0E65C4D3BC5FB564F82FE66AB228044
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.479682422.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.468183567.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >

                                                                        Executed Functions

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ($3$O$R
                                                                        • API String ID: 0-999886361
                                                                        • Opcode ID: e4647956ab2459a68381e03177aff4d7433dc436c26885bbfdb9c098283c7834
                                                                        • Instruction ID: fb0a300b2ee337ddaaeff326397fec4e6519e32030ee2b268705048c8afc8ab0
                                                                        • Opcode Fuzzy Hash: e4647956ab2459a68381e03177aff4d7433dc436c26885bbfdb9c098283c7834
                                                                        • Instruction Fuzzy Hash: 3072EF70D49229CFEB64DF65D884BEDB7B1BB8A304F1081EAD009A7290DB745AC4DF49
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8$d
                                                                        • API String ID: 0-1846421981
                                                                        • Opcode ID: d0ddf0aac75a94bce2817454e39e1483c4c6d62461f1982179450badb8ff0306
                                                                        • Instruction ID: 341fab1b105f53fb940e170e752c6e2e5dc6b3594749ab20baf25b20f11fd89b
                                                                        • Opcode Fuzzy Hash: d0ddf0aac75a94bce2817454e39e1483c4c6d62461f1982179450badb8ff0306
                                                                        • Instruction Fuzzy Hash: 7AD11C70C09318CFDB24CFA6E8547EDBBB5BB4A345F10A1AAD009B3290DB744A85DF59
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8$d
                                                                        • API String ID: 0-1846421981
                                                                        • Opcode ID: d688cd5adb73234f5d2faeb0f1b4fa183cb207c8629f2dc8f01500b42f21eca0
                                                                        • Instruction ID: 6119bc97844dc2476f069e62db9a6ade3e60cee10b8086423d609829abdac952
                                                                        • Opcode Fuzzy Hash: d688cd5adb73234f5d2faeb0f1b4fa183cb207c8629f2dc8f01500b42f21eca0
                                                                        • Instruction Fuzzy Hash: 8EC15B70C09318CFDB24CF66E8947EDBBB5BF4A305F10A1AAD049A7291DB344A85DF58
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8
                                                                        • API String ID: 0-4194326291
                                                                        • Opcode ID: 2ed704c6815b235119bf65a6fcf8bc2185f94e1c30d56b048d902b3d52d1892b
                                                                        • Instruction ID: 56d34cd8ae00d2448350895374909ad39eaf619eafdf040ea93ffc9c05e52075
                                                                        • Opcode Fuzzy Hash: 2ed704c6815b235119bf65a6fcf8bc2185f94e1c30d56b048d902b3d52d1892b
                                                                        • Instruction Fuzzy Hash: 04911B70D15319CFDB24CF66E8547ADBBB5BB4A345F10A0AAE009B3290DB344A84DF58
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 696d6115e084a16f9fa69dbdec46d2cdbee07ed195fcc23ec60717c6ed189c93
                                                                        • Instruction ID: a1b047656af1ef4dfd67a0bb382895819fed6299ab892d4c700cdf64d946fc51
                                                                        • Opcode Fuzzy Hash: 696d6115e084a16f9fa69dbdec46d2cdbee07ed195fcc23ec60717c6ed189c93
                                                                        • Instruction Fuzzy Hash: 5D11A4B5E056588BDB08CFABD8406EEFAF6AFC9314F14D13AD819A7254EB3405418E58
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031FFE0A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: d2e912c61f1b69d75bdde3cf3e9b32dc2d7393cf5da9dacba656a17751edc2e9
                                                                        • Instruction ID: 1894503697a4f1f33d6f9e68963dd4317f4ee8ee6a9b9ef9d1992668bbdeafa7
                                                                        • Opcode Fuzzy Hash: d2e912c61f1b69d75bdde3cf3e9b32dc2d7393cf5da9dacba656a17751edc2e9
                                                                        • Instruction Fuzzy Hash: 1B5112B1C04249EFDF01CFA9C880ADEBFB1BF49304F19816AE918AB221D3719955CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 09C19253
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: 71b18450a69c567a465366bc35114b7f92c0dc423c7c9d5987ab7ef606859a06
                                                                        • Instruction ID: 91bb31092da02a8c49225f212d3b7e0e83670c87e6ed2806cee7527b7ffbfff6
                                                                        • Opcode Fuzzy Hash: 71b18450a69c567a465366bc35114b7f92c0dc423c7c9d5987ab7ef606859a06
                                                                        • Instruction Fuzzy Hash: 7F511371D003199FDF64DF99D880BDDBBB1BB49304F15809AE808A7210DB705A88CF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031FFE0A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 70037eb82bb175ad2ff097ff64368b5294e43159744f2ca03a2c91fd7ee6b4c1
                                                                        • Instruction ID: b8749f3c61b3cac17c27b4cfe5f32307ea02488ee2336417f927b9c7aba1ff6a
                                                                        • Opcode Fuzzy Hash: 70037eb82bb175ad2ff097ff64368b5294e43159744f2ca03a2c91fd7ee6b4c1
                                                                        • Instruction Fuzzy Hash: 2751B0B1D003099FDB14CFA9C884ADEBBB5BF88314F25812AE919AB211D7749945CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 031F5421
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 3309063ace687693790a1a3e44ff2a8dfd55124dee65d966850bdf2f4e21f541
                                                                        • Instruction ID: c66e69d6bb2a15bf7ac1cd741c3f2856dbd45a5978abde0c3f2b580d08e447f9
                                                                        • Opcode Fuzzy Hash: 3309063ace687693790a1a3e44ff2a8dfd55124dee65d966850bdf2f4e21f541
                                                                        • Instruction Fuzzy Hash: 1341F271C00618CFDB24DFAAC84479DBBB2BF49305F24805AD508AB251EB756945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 031F5421
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: b1a2e7762da8995f19e9497f79f1db83358bb0ddc614fc774d05caec9fbb6788
                                                                        • Instruction ID: 74d1ca8d09a785b085bb6002f2fa54d4d4393c6771c2a7448c3acce3b38994a9
                                                                        • Opcode Fuzzy Hash: b1a2e7762da8995f19e9497f79f1db83358bb0ddc614fc774d05caec9fbb6788
                                                                        • Instruction Fuzzy Hash: BD41F370C04618CFDB24EFAAC88479DBBB2BF49305F24805AD509AB251EB756949CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031FB87E,?,?,?,?,?), ref: 031FB93F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: fe6b83dec3431c3a6fcd346d654b2aec4cf2b08151a2a9ce18aa7c5258faba27
                                                                        • Instruction ID: 84caeca253825fa7043281adc72c7a54a7b2e89762e318bbd76d7d67d0cd220b
                                                                        • Opcode Fuzzy Hash: fe6b83dec3431c3a6fcd346d654b2aec4cf2b08151a2a9ce18aa7c5258faba27
                                                                        • Instruction Fuzzy Hash: 383127B8A403049FE741AF64F54A7BE7BAAE789700F10902AFE41CB385CB746841CF21
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031FB87E,?,?,?,?,?), ref: 031FB93F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: dec9880de2ed1587c089d58ef36927316aa842e0e640035b7285b43348a3616d
                                                                        • Instruction ID: 32db33e7c67e090362370d7361eab5080d59cceb3d5855f3e015440625755905
                                                                        • Opcode Fuzzy Hash: dec9880de2ed1587c089d58ef36927316aa842e0e640035b7285b43348a3616d
                                                                        • Instruction Fuzzy Hash: 0D21E4B5904209DFDB10DFAAD884AEEBBF8FB48320F14805AE915A7310D374A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09C1960D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: ffa8e581ebae0a1e32601e21a07c585230dc32b5c14460fa8916fc39a87a4cc6
                                                                        • Instruction ID: 2fe3e825b1285077051367e185b14941544162b6c9a34bc7a65c827ef0191373
                                                                        • Opcode Fuzzy Hash: ffa8e581ebae0a1e32601e21a07c585230dc32b5c14460fa8916fc39a87a4cc6
                                                                        • Instruction Fuzzy Hash: 1A2114B19002099FCB10CFAAD884BDEBBF4FB48310F10842AE919E7240D774AA44CBA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,031FB87E,?,?,?,?,?), ref: 031FB93F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 2d81a40179cb5660531e094deface38d647d9a254c99737a1ffbaac4ef1f2a1c
                                                                        • Instruction ID: e64db50ff7c0a064322222bfe1b1ce3aaa0599f826962c4f4345671f0ef5943c
                                                                        • Opcode Fuzzy Hash: 2d81a40179cb5660531e094deface38d647d9a254c99737a1ffbaac4ef1f2a1c
                                                                        • Instruction Fuzzy Hash: E721E4B59002089FDB10DFAAD984ADEBBF8FB48324F14801AE914A7310D374A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09C19487
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: c1bf91f7a9c3f1647f91e784b8f40727d02a14dc01a0f0e8e790fd9131d34efe
                                                                        • Instruction ID: eef3c9cd6562c6f2bfb0668eb473fe2eedb079c87b3dc0cda4e0bfc3ed6b72da
                                                                        • Opcode Fuzzy Hash: c1bf91f7a9c3f1647f91e784b8f40727d02a14dc01a0f0e8e790fd9131d34efe
                                                                        • Instruction Fuzzy Hash: 8121E2B5D00259DFCB10DF9AD884BDEBBF4FB48320F10842AE918A7250D374A954DFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 09C193BF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 8ae24fac1f06ff221c7aa2bcb77fde73727c8caae1a0355afada66753f1abbc2
                                                                        • Instruction ID: 43816929e6288e4bf5c87fbcf17ab5da8beaff78dfa6c715fdeb7b71c9793789
                                                                        • Opcode Fuzzy Hash: 8ae24fac1f06ff221c7aa2bcb77fde73727c8caae1a0355afada66753f1abbc2
                                                                        • Instruction Fuzzy Hash: B72136B1D006199FCB00CF9AD8847DEFBF4BB49220F54812AE418A3340D778A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031F9951,00000800,00000000,00000000), ref: 031F9B62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 9c2e58b1832eaf59d5a393694148d62feac0fc0e7a02eddeb1fd6259e0ac523d
                                                                        • Instruction ID: 32690127516ddd7b034aa08403ee1a2bbd7169164db17ec6c254b2ff49d39af0
                                                                        • Opcode Fuzzy Hash: 9c2e58b1832eaf59d5a393694148d62feac0fc0e7a02eddeb1fd6259e0ac523d
                                                                        • Instruction Fuzzy Hash: 5F1114B2D002099FCB14DFAAD484BDEFBF4EB88324F14856AE516A7200C375A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031F9951,00000800,00000000,00000000), ref: 031F9B62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 59fa7ce0aab6654b9364c82112dfb95960b8ef5f68d5207953186164073690ec
                                                                        • Instruction ID: 383224a686f40653d9474c63cf81dcdd6251005f1f140ae7d7890e23b8c5859f
                                                                        • Opcode Fuzzy Hash: 59fa7ce0aab6654b9364c82112dfb95960b8ef5f68d5207953186164073690ec
                                                                        • Instruction Fuzzy Hash: E01117B6D003489FDB10DFAAD444BDEFBF4EB48310F14852AE519A7200C375A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09C19543
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: eda58a401714e3ccce8f98eb322b1dc874fcbf161ed4f789a70ea33584b2dc6b
                                                                        • Instruction ID: ed932adc953792ce7f7b3f59536df46c006f842c199ad6d082b0c952b8d90a51
                                                                        • Opcode Fuzzy Hash: eda58a401714e3ccce8f98eb322b1dc874fcbf161ed4f789a70ea33584b2dc6b
                                                                        • Instruction Fuzzy Hash: A21136B5800249DFCB10DF9AD884BDEBFF4FB48324F10841AE529A7210C335A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 031F98D6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 42f5cc0bc06a1065339c9bd81e01424219cab6139fd5351a564d6adf051486a9
                                                                        • Instruction ID: 99cb1869bafcc2cb5825193e6ea083da5c005a82103658f43a8bfb379148a149
                                                                        • Opcode Fuzzy Hash: 42f5cc0bc06a1065339c9bd81e01424219cab6139fd5351a564d6adf051486a9
                                                                        • Instruction Fuzzy Hash: 96110FB2C002098FDB10EF9AD444BDEFBF8EB88324F14846AD429B7200C374A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,031FFF28,?,?,?,?), ref: 031FFF9D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: 02c90fb296eedd23f0fa5dcda0c1e9f3eb5adbc681de2c4c5f26e9012b4d08f2
                                                                        • Instruction ID: cdac3cd3fbd27a2259d975880156d72b6d63e96366b61220fa978a9c81e44ede
                                                                        • Opcode Fuzzy Hash: 02c90fb296eedd23f0fa5dcda0c1e9f3eb5adbc681de2c4c5f26e9012b4d08f2
                                                                        • Instruction Fuzzy Hash: 431106B58002099FDB10DF9AD584BDEFBF8EB49324F14845AE915B7340C374A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 09C199D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: 6e69abd31a559db6d86fa29ac06451d218f3f4baf90a49870f8b789064a29a07
                                                                        • Instruction ID: 7b159fe76c74ff6ead052a47512c142b6db55d8071ba14c716b54aa05f2d3354
                                                                        • Opcode Fuzzy Hash: 6e69abd31a559db6d86fa29ac06451d218f3f4baf90a49870f8b789064a29a07
                                                                        • Instruction Fuzzy Hash: 8F1106B58003499FDB10DF9AD484BEEBBF8EB49324F10845AE519A7300C374A944CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 031F98D6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: fe85842067072baf227161770a2f1ae13de32f9b79e19e7a6aa34a0c5db6152e
                                                                        • Instruction ID: a380f562fa11c5d9905962a07633f896cd3316b38984f718c799d63fd647cfe2
                                                                        • Opcode Fuzzy Hash: fe85842067072baf227161770a2f1ae13de32f9b79e19e7a6aa34a0c5db6152e
                                                                        • Instruction Fuzzy Hash: 79112DB6C002098FCB10DF9AC444BDEFBF4AF48324F14846AD429B7200C334A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,031FFF28,?,?,?,?), ref: 031FFF9D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: a7b1407b3f841392a15dbc12a9b41d4c0c08e992a18ce7e78d08be503a9fc285
                                                                        • Instruction ID: 44bf3197d30bc96ea23b914f5a8c8ee8157dac4f2a4e3efec3ad8a94ef9d8f52
                                                                        • Opcode Fuzzy Hash: a7b1407b3f841392a15dbc12a9b41d4c0c08e992a18ce7e78d08be503a9fc285
                                                                        • Instruction Fuzzy Hash: 421122B68002098FDB10DF99D589BDEFBF8EB48320F14844AE919B3240D374AA44CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: 2085cf0fe9a21e6d6b8c70c044274915de637fe4dd3ca439a091a98d33bd94f7
                                                                        • Instruction ID: fbf93c531b66162621da251c9fc957af61ed5fb0f1b352dd5503656645c267da
                                                                        • Opcode Fuzzy Hash: 2085cf0fe9a21e6d6b8c70c044274915de637fe4dd3ca439a091a98d33bd94f7
                                                                        • Instruction Fuzzy Hash: DB1112B5D00209CFCB10DF9AE585BDEBBF8AB48224F24845AD519A7350D374A944CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: e23c4e5d59b7c07fb1b2c3b2c616e3ef2d572defeb80bc5de4dc610a65a28f04
                                                                        • Instruction ID: dbc52302b0c3b382eec5e33d566bc9aed00c0616270d877023fe3ca3098b76f1
                                                                        • Opcode Fuzzy Hash: e23c4e5d59b7c07fb1b2c3b2c616e3ef2d572defeb80bc5de4dc610a65a28f04
                                                                        • Instruction Fuzzy Hash: 141112B1C002098FCB10DF9AE484BDEBBF8EB49324F20845AE519A7340C774A944CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Non-executed Functions

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: cY
                                                                        • API String ID: 0-835675635
                                                                        • Opcode ID: 0e5540a14222482ab2ad88eaf86f1220cf2bf88f521760945b5b7ac2ac26c917
                                                                        • Instruction ID: c49945ca9bc4439cc02cbe449e2454ba5cc727a8266239367fc80e5db4180b7c
                                                                        • Opcode Fuzzy Hash: 0e5540a14222482ab2ad88eaf86f1220cf2bf88f521760945b5b7ac2ac26c917
                                                                        • Instruction Fuzzy Hash: 6C03A07A600514AFDB568F94C944E95BBB6FF4C318F0680D8E60A5F272C736E8A1EF50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.226130517.0000000009C10000.00000040.00000001.sdmp, Offset: 09C10000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #9x$6F
                                                                        • API String ID: 0-572630354
                                                                        • Opcode ID: 39700bdb2feda0e75003a1dda9c2b798d92df916726cc031f639fc3456eecd0d
                                                                        • Instruction ID: d92f35475b527fc1b706802072f1792ca8a3432ebfd418462123c4afe7ff78ae
                                                                        • Opcode Fuzzy Hash: 39700bdb2feda0e75003a1dda9c2b798d92df916726cc031f639fc3456eecd0d
                                                                        • Instruction Fuzzy Hash: 2451E574F1018EAFD744CE6AE8401AD77F6A7CA360F94C8B5E026DB744E638D9029F05
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b376c9fb6b80a5af31196882fe7cdec1d00c70f6c1c4be549fa5eab50dc028a3
                                                                        • Instruction ID: 26c1250152935e6656267e694423b0b07cde9aab855c63c303239fb72670b310
                                                                        • Opcode Fuzzy Hash: b376c9fb6b80a5af31196882fe7cdec1d00c70f6c1c4be549fa5eab50dc028a3
                                                                        • Instruction Fuzzy Hash: DA12C8F14917468AD310EF65F69C1893BA1F7E6328F70C289D2611FAD9DBB8114ACF84
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4b1d1b3377e4cfd734ada46161d60cce11844f0e36d9d3bf95e81bb4ead3cabb
                                                                        • Instruction ID: 4bc057b68bfdd06fbc32af37417606dff759fc6ceb285184bb8085e2eeb6d07d
                                                                        • Opcode Fuzzy Hash: 4b1d1b3377e4cfd734ada46161d60cce11844f0e36d9d3bf95e81bb4ead3cabb
                                                                        • Instruction Fuzzy Hash: 97A18036E00209CFCF05EFB5D8445EDBBB6FF89300B15856AE905BB264DB31A955CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.219275866.00000000031F0000.00000040.00000001.sdmp, Offset: 031F0000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 512406f824476c0066fd29db8d25872ea50c1fb711b318a6e21bdcad700334d7
                                                                        • Instruction ID: 58dc536e745503fde4bd05f0d3c37659476b439b1ba93ea1b80a88dc4452cce1
                                                                        • Opcode Fuzzy Hash: 512406f824476c0066fd29db8d25872ea50c1fb711b318a6e21bdcad700334d7
                                                                        • Instruction Fuzzy Hash: 7EC11AB18517468AD710EF64FA8C1897BB1FBE6328F70C289D1612B6D8DFB4114ACF94
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Executed Functions

                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.475966723.0000000001350000.00000040.00000001.sdmp, Offset: 01350000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 956c588fb361daa2f68a2fab247d20436ded71eee5eefea4612fa5484fac94f8
                                                                        • Instruction ID: 77415deffa6a9cffcb8a5872194f6e070e526f808533f15322041b1cc6c7cade
                                                                        • Opcode Fuzzy Hash: 956c588fb361daa2f68a2fab247d20436ded71eee5eefea4612fa5484fac94f8
                                                                        • Instruction Fuzzy Hash: 1A722A34E006198FCB65EFB8C854A9EB7F2AF89704F1085A9D54AAB350EF309D85CF51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 03166C70
                                                                        • GetCurrentThread.KERNEL32 ref: 03166CAD
                                                                        • GetCurrentProcess.KERNEL32 ref: 03166CEA
                                                                        • GetCurrentThreadId.KERNEL32 ref: 03166D43
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 055da4198e64854fb45c03c6257289353bede2c700ee0ce437a866e04bd4fbc2
                                                                        • Instruction ID: e7a7118fbdc2780bf71338c29520d63c77349fedf7dc31ba02d1de3c66648c86
                                                                        • Opcode Fuzzy Hash: 055da4198e64854fb45c03c6257289353bede2c700ee0ce437a866e04bd4fbc2
                                                                        • Instruction Fuzzy Hash: 2F5154B09057888FDB00DFA9C948BDEBFF0EF49314F24849AE449A72A1D7345884CF62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 03166C70
                                                                        • GetCurrentThread.KERNEL32 ref: 03166CAD
                                                                        • GetCurrentProcess.KERNEL32 ref: 03166CEA
                                                                        • GetCurrentThreadId.KERNEL32 ref: 03166D43
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: c9f3bb216e9270652ed8942ddf78858de1d5af6e6740ce982dc1b014f97d27e0
                                                                        • Instruction ID: e323b3344b42633b3195b415b46325e7545f00676705bf62babc9bc86c5fa525
                                                                        • Opcode Fuzzy Hash: c9f3bb216e9270652ed8942ddf78858de1d5af6e6740ce982dc1b014f97d27e0
                                                                        • Instruction Fuzzy Hash: 805143B49006498FDB10DFAADA48B9EBBF1FF88314F24845AE459B7390D7346884CF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: x
                                                                        • API String ID: 0-2363233923
                                                                        • Opcode ID: 8dd32294fc51fdf9ed0a6b4b7ff763cbfed027c1f7d8d296829e73b0b1702602
                                                                        • Instruction ID: b19ae2323a8857f983710abb7b0eb9a596a102dcec2715caf77606bef7aeaa5f
                                                                        • Opcode Fuzzy Hash: 8dd32294fc51fdf9ed0a6b4b7ff763cbfed027c1f7d8d296829e73b0b1702602
                                                                        • Instruction Fuzzy Hash: 8751FE71C00248EFCF05CFA9C884ADEBFB6BF49310F19816AE918AB221D7719854CF51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 031642D6
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 6da45180aee048ed28b3fe18eeeaf4ad98b9df7cc60c32c97b4679f3b4c27e04
                                                                        • Instruction ID: 362d4063fda0c4f415fbfd27b1eb8ba3e0c524baff452a8b00a53d9eab1eec4a
                                                                        • Opcode Fuzzy Hash: 6da45180aee048ed28b3fe18eeeaf4ad98b9df7cc60c32c97b4679f3b4c27e04
                                                                        • Instruction Fuzzy Hash: B3C1BC74A007018FCB18EFBAC49466EBBF1FF88204B14896ED51ADB751DB34E8558FA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.475966723.0000000001350000.00000040.00000001.sdmp, Offset: 01350000, based on PE: false
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 0e6b56f912797df3c8bc88042db860def61b2a065358c637be11458c49ac6deb
                                                                        • Instruction ID: 675f67995739d127adfd86b7a4a7a8e80c6b28b2295889a4d66fcd04e544674e
                                                                        • Opcode Fuzzy Hash: 0e6b56f912797df3c8bc88042db860def61b2a065358c637be11458c49ac6deb
                                                                        • Instruction Fuzzy Hash: F2919030A003499FDB55EBB8D858BAE7BF9AF89708F108429D801DB395DB789C05CB51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.476096105.0000000001360000.00000040.00000001.sdmp, Offset: 01360000, based on PE: false
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 64fb3cd3660f4632f1f94545ccc64f3d789b2cc2c348b9c7e54e4162d0d581ff
                                                                        • Instruction ID: ae5cb8568a2dcc19e2f2ae56171e046cac46581506e21ef68cbf7abc9635c3ee
                                                                        • Opcode Fuzzy Hash: 64fb3cd3660f4632f1f94545ccc64f3d789b2cc2c348b9c7e54e4162d0d581ff
                                                                        • Instruction Fuzzy Hash: 1551E330A003059FCB45EFB4D858A9EB7F6BF89204B058969E4129F795EF70DC18CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.476096105.0000000001360000.00000040.00000001.sdmp, Offset: 01360000, based on PE: false
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 71c1698743097b087969723568c85fea607846592fcee911bf8b7084918e73da
                                                                        • Instruction ID: 83a2e9bc2fcc9383c197e5a16f847b01280f04fbc53cb6701dbb0e5c9e24c792
                                                                        • Opcode Fuzzy Hash: 71c1698743097b087969723568c85fea607846592fcee911bf8b7084918e73da
                                                                        • Instruction Fuzzy Hash: 5851B530A102059FCB44FFB4D858AAEB7F5BF89204B058569E5129F395EF70EC14CB60
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 03165362
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: a49cc21b8081b1b4c02dc76aeeb8cbdbb798353a81330dc1054f022caba287db
                                                                        • Instruction ID: ddfaaacc8147d8f13a0c92edb9ade970dfb2103e5882ec782c46fc1624852258
                                                                        • Opcode Fuzzy Hash: a49cc21b8081b1b4c02dc76aeeb8cbdbb798353a81330dc1054f022caba287db
                                                                        • Instruction Fuzzy Hash: 3751D0B1D003499FDB14CFA9C884ADEBBB6BF88310F24812AE819AB210D7749855CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 01353249
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.475966723.0000000001350000.00000040.00000001.sdmp, Offset: 01350000, based on PE: false
                                                                        Similarity
                                                                        • API ID: QueryValue
                                                                        • String ID:
                                                                        • API String ID: 3660427363-0
                                                                        • Opcode ID: ced7924407f9a2d9e83192d27efc0517184a3f0212fcde7a8764f913976d60b1
                                                                        • Instruction ID: 3bfb2baee1587804f2af1eab26210f98aeaf05c2789acd02c59f2b8b18fc246b
                                                                        • Opcode Fuzzy Hash: ced7924407f9a2d9e83192d27efc0517184a3f0212fcde7a8764f913976d60b1
                                                                        • Instruction Fuzzy Hash: C94134B0E003589FCB10CFA9C884ADEBBF5BF48794F14802AE918AB300D7349945CF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 03165362
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 7b7ebb598a46aa62b913762166ed8a589633c8c4e33fdbfaf8c8d9640a186a73
                                                                        • Instruction ID: 3630434c35214c42c14d648496daa86908cb9468b2270e5f64b277e2d73c066f
                                                                        • Opcode Fuzzy Hash: 7b7ebb598a46aa62b913762166ed8a589633c8c4e33fdbfaf8c8d9640a186a73
                                                                        • Instruction Fuzzy Hash: 5B41C0B1D00348DFDB14CFD9C884ADEBBB6BF88710F24812AE919AB210D7749855CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 01353249
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.475966723.0000000001350000.00000040.00000001.sdmp, Offset: 01350000, based on PE: false
                                                                        Similarity
                                                                        • API ID: QueryValue
                                                                        • String ID:
                                                                        • API String ID: 3660427363-0
                                                                        • Opcode ID: 4e0994c454a0b219f78bbb0203fae76597ff987ed3ae7b873c6a86037b6d0978
                                                                        • Instruction ID: 80d979df6c88223e481cdece6d95df317a7b61203cdacf8f43a8e18a6131ce49
                                                                        • Opcode Fuzzy Hash: 4e0994c454a0b219f78bbb0203fae76597ff987ed3ae7b873c6a86037b6d0978
                                                                        • Instruction Fuzzy Hash: CD4123B1D003589FCB50CFA9C884ADEBBF5BF48794F55802AE819AB350D7349905CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 03167DC1
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: 8ec7830d45f6a7d21a887309be6c349e199090b7db808d32ffb8cbfaf8562fd3
                                                                        • Instruction ID: 6282fd2f9d5fb1476388f3ff30f088ec488906ddbcc03284961d99a854f2d97b
                                                                        • Opcode Fuzzy Hash: 8ec7830d45f6a7d21a887309be6c349e199090b7db808d32ffb8cbfaf8562fd3
                                                                        • Instruction Fuzzy Hash: 22416AB49002059FCB14CF99C848AAABBF5FF8C318F24C849E519A7361C334A851CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • RegOpenKeyExW.KERNEL32(?,00000000,?,00000001,?), ref: 01352F8C
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.475966723.0000000001350000.00000040.00000001.sdmp, Offset: 01350000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Open
                                                                        • String ID:
                                                                        • API String ID: 71445658-0
                                                                        • Opcode ID: 69e583246d2863509285d717ac63d78c36276d54ed0c333e3dd2216bc3733607
                                                                        • Instruction ID: eb223f3ae621a3d6a04ecc1a749df2a03ad6a85a2a89ed3a82994b07068a8fdf
                                                                        • Opcode Fuzzy Hash: 69e583246d2863509285d717ac63d78c36276d54ed0c333e3dd2216bc3733607
                                                                        • Instruction Fuzzy Hash: 6D31F2B0C00289DFDB10CF99C584A8EFFF5BB48318F29816AE909AB341C7759845CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • RegOpenKeyExW.KERNEL32(?,00000000,?,00000001,?), ref: 01352F8C
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.475966723.0000000001350000.00000040.00000001.sdmp, Offset: 01350000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Open
                                                                        • String ID:
                                                                        • API String ID: 71445658-0
                                                                        • Opcode ID: 884cb58aae9fd93ab88474c006cc083f91680fc1ecaa65b9ca2e549caba0886e
                                                                        • Instruction ID: 19354122fcfacef1bcd01cfbb1957446cca86534e3617328d3de0d8c06cf8acb
                                                                        • Opcode Fuzzy Hash: 884cb58aae9fd93ab88474c006cc083f91680fc1ecaa65b9ca2e549caba0886e
                                                                        • Instruction Fuzzy Hash: EE31F2B0D00249CFDB10CF99C584A8EFFF5BF48708F25816AE909AB345C7759889CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 03166EBF
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 421d1c9b0358ea5c74d88a8e25e93e069ba5da3699a65103c2e105d8a0fef5fc
                                                                        • Instruction ID: 2e19dbb4ec4fa8fe65ef337c993e5cc8b4875bff67639ed4ed46eb553014c1b8
                                                                        • Opcode Fuzzy Hash: 421d1c9b0358ea5c74d88a8e25e93e069ba5da3699a65103c2e105d8a0fef5fc
                                                                        • Instruction Fuzzy Hash: 6C21D2B59002089FDB10CFA9D984ADEBBF8FB48324F14841AE958A7311D378A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 03166EBF
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: c6333afebe637a2e9fb0b07d5a275f2ce7e7a86d3decb542e5763d20dba183bd
                                                                        • Instruction ID: 97eae682564fb028caaa5a6b57f7554a9fc00ba63edc1f8cee85d94f8a2d9a60
                                                                        • Opcode Fuzzy Hash: c6333afebe637a2e9fb0b07d5a275f2ce7e7a86d3decb542e5763d20dba183bd
                                                                        • Instruction Fuzzy Hash: 2421D5B59002489FDB10CFA9D984ADEFBF8FB48324F14841AE954A7350D374A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 0189100B
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.479817086.0000000001890000.00000040.00000001.sdmp, Offset: 01890000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HookWindows
                                                                        • String ID:
                                                                        • API String ID: 2559412058-0
                                                                        • Opcode ID: 1d7ec7cd89bd27dd0ec6a5391fa67b2749c05dd16b82b7aabd75dc7b84fe5653
                                                                        • Instruction ID: 4004156b28e962ceeea9905f65f49b5e69b2bca749d95fe5c422c281bf3a2b2e
                                                                        • Opcode Fuzzy Hash: 1d7ec7cd89bd27dd0ec6a5391fa67b2749c05dd16b82b7aabd75dc7b84fe5653
                                                                        • Instruction Fuzzy Hash: A5213571D042099FCB14DFA9C844BEEFBF5BB88324F14842AE559A7240D774A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 031642D6
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 884d597bc0f6408b398a10a2508f19ae6f6262967cb84329bedc089659cade01
                                                                        • Instruction ID: ef64550134244c44ebef33a5bdb44c67345745e2694e538eb56d9f5b0bd1d579
                                                                        • Opcode Fuzzy Hash: 884d597bc0f6408b398a10a2508f19ae6f6262967cb84329bedc089659cade01
                                                                        • Instruction Fuzzy Hash: 682144B18042488FCF20EFAAD444BDEFBF4EF49224F15846AD569B7200C774A556CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 0189100B
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.479817086.0000000001890000.00000040.00000001.sdmp, Offset: 01890000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HookWindows
                                                                        • String ID:
                                                                        • API String ID: 2559412058-0
                                                                        • Opcode ID: 9bf342e3730c161cec8c932382b99112ce64d576cb3fc71bb7bb7d56fe27bdc7
                                                                        • Instruction ID: d51dca022cfe3b071fa21f4db5b79362e71fda08f34406d2107ece8bf6a86447
                                                                        • Opcode Fuzzy Hash: 9bf342e3730c161cec8c932382b99112ce64d576cb3fc71bb7bb7d56fe27bdc7
                                                                        • Instruction Fuzzy Hash: 1E212471D042098FCF14DFAAC844BEEBBF5FB88324F14842AE519A7250CB74A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?), ref: 0189D19A
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.479817086.0000000001890000.00000040.00000001.sdmp, Offset: 01890000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: f61bc3e6d890ce8e7c4dfba3513e98d470e0ad36c9a3a49c400d6e3a23183433
                                                                        • Instruction ID: d57ca3780c71b2f6c274e3e9652cb726a92eddd059e252c98755e4cfc74f37b8
                                                                        • Opcode Fuzzy Hash: f61bc3e6d890ce8e7c4dfba3513e98d470e0ad36c9a3a49c400d6e3a23183433
                                                                        • Instruction Fuzzy Hash: 512147B2C003488FCB10CFAAD444BDEFBF4AB89324F14851EE555A7210C375A545CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?), ref: 0189D19A
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.479817086.0000000001890000.00000040.00000001.sdmp, Offset: 01890000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: ea588b8784e3ff8de8a80b5ec50a67616ebc37bd8f9f6fd0f1ad4089b1046032
                                                                        • Instruction ID: 238f562785ba53e35d601c9d43ef5cabd0bf4c0631fe0e59d94ca3ca1ec09277
                                                                        • Opcode Fuzzy Hash: ea588b8784e3ff8de8a80b5ec50a67616ebc37bd8f9f6fd0f1ad4089b1046032
                                                                        • Instruction Fuzzy Hash: 061114B69006099FDF10DF9AC844BDEFBF4EB88324F14852AE919A7210C375A545CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 0316C7E2
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: EncodePointer
                                                                        • String ID:
                                                                        • API String ID: 2118026453-0
                                                                        • Opcode ID: b817b126834faa4a9f5742790231fa07ed3e60014cbbaba71632242e6ea68536
                                                                        • Instruction ID: fbd53a1d3a8ec9630bdba0bdb39ab18f1ef835b9309fa3572a31eccf7b3ea8af
                                                                        • Opcode Fuzzy Hash: b817b126834faa4a9f5742790231fa07ed3e60014cbbaba71632242e6ea68536
                                                                        • Instruction Fuzzy Hash: C0216AB59012458FCB20DFA9D94879EBBF8EB48314F24842AE544A3200D7385444CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 0316C7E2
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: EncodePointer
                                                                        • String ID:
                                                                        • API String ID: 2118026453-0
                                                                        • Opcode ID: accd6ec1840f8234633f450ccd5f57b74853f5428c3eb3d84afc06475e97bd6d
                                                                        • Instruction ID: f28e3798113a5d81c88cb435b8900763d0d02de82385d11545c73d4d0ac87ba1
                                                                        • Opcode Fuzzy Hash: accd6ec1840f8234633f450ccd5f57b74853f5428c3eb3d84afc06475e97bd6d
                                                                        • Instruction Fuzzy Hash: 90119AB59013098FCB20DFE9D9487DEBBF8FB48314F24802AE544A3200DB396844CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 031642D6
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.480034517.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 9e2ee90ecaa4e1f597279b86948013cc8c819a5d48e03ea1c9badd9c46047e83
                                                                        • Instruction ID: 99c437b4decd44b27908e65d7277ab240c0c97164149cc5c2d5b62725770282c
                                                                        • Opcode Fuzzy Hash: 9e2ee90ecaa4e1f597279b86948013cc8c819a5d48e03ea1c9badd9c46047e83
                                                                        • Instruction Fuzzy Hash: C71132B5C006098FCB20DF9AD444BDEFBF4EB88324F24842AD529B7200C774A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Non-executed Functions

                                                                        Executed Functions

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 007BB6F0
                                                                        • GetCurrentThread.KERNEL32 ref: 007BB72D
                                                                        • GetCurrentProcess.KERNEL32 ref: 007BB76A
                                                                        • GetCurrentThreadId.KERNEL32 ref: 007BB7C3
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 0589569bd78ab7673e5bae024c5f54a76a65507b0fbd8aee789fa37ed630771f
                                                                        • Instruction ID: 03277236b60e824ac4083a4a15de052d63b0eac05b30ad1831d899b2e58713aa
                                                                        • Opcode Fuzzy Hash: 0589569bd78ab7673e5bae024c5f54a76a65507b0fbd8aee789fa37ed630771f
                                                                        • Instruction Fuzzy Hash: C05156B4D006498FDB14DFAAD988BDEBBF5EF88314F2084AAE409A7350D7745884CF65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 007BB6F0
                                                                        • GetCurrentThread.KERNEL32 ref: 007BB72D
                                                                        • GetCurrentProcess.KERNEL32 ref: 007BB76A
                                                                        • GetCurrentThreadId.KERNEL32 ref: 007BB7C3
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 4adae07480dff746c78163f42e958281dbfae9e0736f59422fc703caffe1826e
                                                                        • Instruction ID: 742a92246695519b75934c33413c8eb00671c13dfadeadee57b458661d66db5c
                                                                        • Opcode Fuzzy Hash: 4adae07480dff746c78163f42e958281dbfae9e0736f59422fc703caffe1826e
                                                                        • Instruction Fuzzy Hash: 8D5154B4D006488FDB14DFAAD588BDEBBF5EF88314F20846AE409A7350CB746844CF65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 08A39253
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: e925b503af2ffd45fb048434ca193356b97cddba5d7c2ec512f41eca2bceebc2
                                                                        • Instruction ID: 3d09c5aeb0fb819fdc0b8c98e3e296dd5e194bf08cb807815dfc7adc81ebee79
                                                                        • Opcode Fuzzy Hash: e925b503af2ffd45fb048434ca193356b97cddba5d7c2ec512f41eca2bceebc2
                                                                        • Instruction Fuzzy Hash: 09512371901329DFDB60DF99C880BDEBBB1BF49314F15809AE908B7210CB719A89CF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 08A39253
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: 491c7fc48540c59fe27e1b052fed1546b7821d9254ea80c9127b2fd8ab2f587a
                                                                        • Instruction ID: 65ec90b39c10eebcb41e3c0a15a9558486b1f115824330a63526a269be5cdc62
                                                                        • Opcode Fuzzy Hash: 491c7fc48540c59fe27e1b052fed1546b7821d9254ea80c9127b2fd8ab2f587a
                                                                        • Instruction Fuzzy Hash: 46511371901329DFDB60DF99C880BDEBBB1BF49314F15809AE908B7210DB709A88CF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 007BFE0A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 7cd0c58ac1c851bb684e69a20d508b64bb8dbe32bdaab7fde30d530d409c2edd
                                                                        • Instruction ID: 6cd13a4c1448ab76f006030b134e5eade06d2b029c488de6d36827b124c976b0
                                                                        • Opcode Fuzzy Hash: 7cd0c58ac1c851bb684e69a20d508b64bb8dbe32bdaab7fde30d530d409c2edd
                                                                        • Instruction Fuzzy Hash: 6A51C0B1D00348DFDF15CFA9C884ADEBBB5BF48710F24812AE419AB251D7759985CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 007BFE0A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 512b29c8d4160de408bc2a42270937784fe83a6a3b9523d40e807295e1cb11cb
                                                                        • Instruction ID: ee3f153366399807ffe28f500ee854e0c336760fd14c72accab5a56ae704ebe8
                                                                        • Opcode Fuzzy Hash: 512b29c8d4160de408bc2a42270937784fe83a6a3b9523d40e807295e1cb11cb
                                                                        • Instruction Fuzzy Hash: 9641AEB1D00349DFDF15CFAAC884ADEBBB5BF88714F24812AE819AB210D7749945CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 007B5421
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: cc62bce156621061a4c5f1fef96b584fc44de5192e1bbce6ce817f644326c3a6
                                                                        • Instruction ID: da933e5ed04150027d82e4815da7b92a09244cbd2b631e99e4eab9f0ec017697
                                                                        • Opcode Fuzzy Hash: cc62bce156621061a4c5f1fef96b584fc44de5192e1bbce6ce817f644326c3a6
                                                                        • Instruction Fuzzy Hash: 6D41E370C04618CBDF24DFA9C845BCEBBB5BF49304F248069D409AB251DB75598ACFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 007B5421
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 88d07193427de686228301021ea99154c53eaf508ee3855e2c16840220ee57ae
                                                                        • Instruction ID: 76b462bfba153e0ec20ffed5de6214b343cbc08785cde12af353a98b5d88f9e5
                                                                        • Opcode Fuzzy Hash: 88d07193427de686228301021ea99154c53eaf508ee3855e2c16840220ee57ae
                                                                        • Instruction Fuzzy Hash: D541E270C00659CFDF24DFA9C845BCEBBB5BF49304F248069D409AB251DB75598ACFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 007BB93F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 9ec77cce655a1dcd273d2eab83e71cdb61b273d8f2ff18c0f97f6aa5b3bb2305
                                                                        • Instruction ID: 7c7383b9f86eca940196de5df0003ddb6187d93afbbd72612c7cfc70031895c8
                                                                        • Opcode Fuzzy Hash: 9ec77cce655a1dcd273d2eab83e71cdb61b273d8f2ff18c0f97f6aa5b3bb2305
                                                                        • Instruction Fuzzy Hash: A44150B4A803409FE700EFA0F859BE97BB9F799300F11852AE945CB7A5C7751847DB20
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,069C891D,?,?), ref: 069C89CF
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.306815773.00000000069C0000.00000040.00000001.sdmp, Offset: 069C0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DrawText
                                                                        • String ID:
                                                                        • API String ID: 2175133113-0
                                                                        • Opcode ID: ade419476e545c2fe3a8f0f65c101101d6314efde6fc06cae22ca7a7f3502788
                                                                        • Instruction ID: 4563f539c83b9f52d2fb9cf8a08cfc306fc67b78e5c3eaed88b93e7ac4891bdb
                                                                        • Opcode Fuzzy Hash: ade419476e545c2fe3a8f0f65c101101d6314efde6fc06cae22ca7a7f3502788
                                                                        • Instruction Fuzzy Hash: 5131E2B5D002099FDB10DF9AD884A9EFBF8EB48320F14842EE815A7610D374A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,069C891D,?,?), ref: 069C89CF
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.306815773.00000000069C0000.00000040.00000001.sdmp, Offset: 069C0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DrawText
                                                                        • String ID:
                                                                        • API String ID: 2175133113-0
                                                                        • Opcode ID: b96c3b43eb7192048d0d2b057c129ef9febf2aa6e8a3c9a7d7e2670fab8b3d44
                                                                        • Instruction ID: 398756876aec106979df9890be2bb1d1277e68cf19a1448947c2cedad41271c0
                                                                        • Opcode Fuzzy Hash: b96c3b43eb7192048d0d2b057c129ef9febf2aa6e8a3c9a7d7e2670fab8b3d44
                                                                        • Instruction Fuzzy Hash: 7131E2B5D002099FDB10CF99D884ADEFBF4FB48320F14842EE815A7610C775A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08A3960D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 6fd3490e05b1da7aac0cdebf408f16a5f0242cf54634e581c623d3ff069f2b38
                                                                        • Instruction ID: 82e37037a06c1791d57c282e296e356238da0e758cd91784048c6ac7552aedfc
                                                                        • Opcode Fuzzy Hash: 6fd3490e05b1da7aac0cdebf408f16a5f0242cf54634e581c623d3ff069f2b38
                                                                        • Instruction Fuzzy Hash: 442125B1901259DFCB10CFAAD885BDEFBF4FB48320F04842EE818A7640D774A954CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 007BB93F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 1aaea17bca678fa5eb7a25e0f04396b6911a57c95b9e25c504cae10ba44303aa
                                                                        • Instruction ID: ffe4727376d187bb044db37b2f71d079a86e377b54e5a1fe6086007f6cddf671
                                                                        • Opcode Fuzzy Hash: 1aaea17bca678fa5eb7a25e0f04396b6911a57c95b9e25c504cae10ba44303aa
                                                                        • Instruction Fuzzy Hash: A521D2B59002499FDB10CFAAD884BDEBBF8EB48320F14841AE954A7310D378A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08A39487
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: 42010d3cbfe6427b78cdf4b0b17872a37ca0a0a50e8c8f99aeaded93b6343bb9
                                                                        • Instruction ID: 2bb8b610c2437d042956b51fe28790b327c06e8ca0069953fecd9c0c3e3dcf44
                                                                        • Opcode Fuzzy Hash: 42010d3cbfe6427b78cdf4b0b17872a37ca0a0a50e8c8f99aeaded93b6343bb9
                                                                        • Instruction Fuzzy Hash: AF2123B5900219DFCB10DFAAD884BDEFBF4FB48320F14842AE918A7640D374A954CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08A3960D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 0b3517c0ef1b64fd39369be4eb65fb9a621d4c2887a61b0a7ef9fec72f776ba4
                                                                        • Instruction ID: 7c8e0e460b3a9ab2d03f25add96e71236f87e6560fec03723658aa3f1b10b612
                                                                        • Opcode Fuzzy Hash: 0b3517c0ef1b64fd39369be4eb65fb9a621d4c2887a61b0a7ef9fec72f776ba4
                                                                        • Instruction Fuzzy Hash: FC2103B19002599FCB10CFAAD885BDEFBF4FB48310F14842AE918A7640D774A954CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetThreadContext.KERNELBASE(?,00000000), ref: 08A393BF
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: ac67db4c105c34116095118929d82d2dd77c53b81252149426fa6e87bb1898dd
                                                                        • Instruction ID: 43b3e136d471cb3b6b723b876f1249c3574e94a51ea9d0e2eeeb8549cd2a8496
                                                                        • Opcode Fuzzy Hash: ac67db4c105c34116095118929d82d2dd77c53b81252149426fa6e87bb1898dd
                                                                        • Instruction Fuzzy Hash: D12149B1D006199FCB00DFAAC4457DEFBF4BB49220F04812EE418A7640D774A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 007BB93F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: dd9690a7fac9168382b92ffe298f56d27c722601962d6f4ad12c1c8bdcc9ac1c
                                                                        • Instruction ID: 92a0598d65f467c67c72bc2ac7a4d72e787245d9108f5bbcde4c7564fee21afd
                                                                        • Opcode Fuzzy Hash: dd9690a7fac9168382b92ffe298f56d27c722601962d6f4ad12c1c8bdcc9ac1c
                                                                        • Instruction Fuzzy Hash: 8A21C2B5900249DFDB10CFAAD884BDEBBF8EB48324F14841AE914A7350D378A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08A39487
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: e72b51dd152c50e849e503168029b9791166152190ac136bf20e3b61855780de
                                                                        • Instruction ID: 1f72f36339273b41eeb9d2f7eff2276ac19432b29dfe548c3abcfbc075c1b652
                                                                        • Opcode Fuzzy Hash: e72b51dd152c50e849e503168029b9791166152190ac136bf20e3b61855780de
                                                                        • Instruction Fuzzy Hash: 9721D0B1900659DFCB10DF9AD884BDEBBF4FB48320F14842AE918A7650D374A954CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetThreadContext.KERNELBASE(?,00000000), ref: 08A393BF
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 904bffdc5fd6dcd355b954e3e2453743c5791cac8e16f0ea150a786887fc7e37
                                                                        • Instruction ID: def4e6c8d839b1800ea7ee62f8801360eccba30fa58fdd10db32b7bb278603ed
                                                                        • Opcode Fuzzy Hash: 904bffdc5fd6dcd355b954e3e2453743c5791cac8e16f0ea150a786887fc7e37
                                                                        • Instruction Fuzzy Hash: C22117B1D006199FCB10DFAAC8857DEFBF4BB49324F14812AE418A7740D778A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,007B9951,00000800,00000000,00000000), ref: 007B9B62
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 4266535dfbcf33ed42e6326ab2bfab92084df4f7d880176cc898d9df1cbb6d68
                                                                        • Instruction ID: 9ebe9031e47fd81be6f37b391e261c762cd85528c7e49f80da5987c9da5ed069
                                                                        • Opcode Fuzzy Hash: 4266535dfbcf33ed42e6326ab2bfab92084df4f7d880176cc898d9df1cbb6d68
                                                                        • Instruction Fuzzy Hash: AD1106B69003499FDB11DFAAD444BDEFBF4AB48320F14852AE515A7200C379A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,007B9951,00000800,00000000,00000000), ref: 007B9B62
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 2229246b59596a0e5079c2922ee9c353f92075393b3f0820d40d898fadbeea3e
                                                                        • Instruction ID: c3f8829bbf0ddd8595c4a9606fbef252a8639682e20c8d3fdd251b7509649651
                                                                        • Opcode Fuzzy Hash: 2229246b59596a0e5079c2922ee9c353f92075393b3f0820d40d898fadbeea3e
                                                                        • Instruction Fuzzy Hash: BF1106B59002498FCB10DF9AD444BDEFBF4EB48310F10842AE625A7200C379A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E28,?,?,069CE846), ref: 069CE94E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.306815773.00000000069C0000.00000040.00000001.sdmp, Offset: 069C0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 9010df8a4d2b222847270139ed49506b13d2e4a0f4eaca7701a36da03b7572d3
                                                                        • Instruction ID: 5c6e027199c73f7975d142fc78eb4a7717e5a16e301c14874ac6fc9a87584876
                                                                        • Opcode Fuzzy Hash: 9010df8a4d2b222847270139ed49506b13d2e4a0f4eaca7701a36da03b7572d3
                                                                        • Instruction Fuzzy Hash: E81104B6D007498FCB10DFAAD844BDEFBF8EF88224F14851AD41AA7600C375A545CFA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E28,?,?,069CE846), ref: 069CE94E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.306815773.00000000069C0000.00000040.00000001.sdmp, Offset: 069C0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 4267ae521f76623878aab46ead76e9dcc7374c49278cff7d2c773b9cb1da7426
                                                                        • Instruction ID: 1246fa6d9017695dee871d3741db4cdc822a99a75e71ce8829326ffb4ee30e02
                                                                        • Opcode Fuzzy Hash: 4267ae521f76623878aab46ead76e9dcc7374c49278cff7d2c773b9cb1da7426
                                                                        • Instruction Fuzzy Hash: 6411F6B5D007498FDB50DF9AC444B9EFBF8EB88224F14841AE45AA7600D375A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08A39543
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 222ee5fb67a76955bc7da1825089658db3d80bb30e11d5378c963e8c13312f06
                                                                        • Instruction ID: 8d0f0d7199ae75b2eb387ce256940dc5bdd070607630fd4ef52829f728654d99
                                                                        • Opcode Fuzzy Hash: 222ee5fb67a76955bc7da1825089658db3d80bb30e11d5378c963e8c13312f06
                                                                        • Instruction Fuzzy Hash: 471143B5904249DFCB10DF9AD884BDEBFF4FB48320F148419E529A7600C775A994CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 08A399D5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: 5ea8ddfea1d35db71ba4a07a53fd14c19bde30a8061c39c9db9813a86b49e793
                                                                        • Instruction ID: 59bc07f2854898cb01f075936c642f743a66b64dc761904962c5c039e129c473
                                                                        • Opcode Fuzzy Hash: 5ea8ddfea1d35db71ba4a07a53fd14c19bde30a8061c39c9db9813a86b49e793
                                                                        • Instruction Fuzzy Hash: E91125B5800749DFDB20DF9AD885BDEBFF8EB48324F14845AE454A7601C375A544CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 08A3AB88
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ChangeCloseFindNotification
                                                                        • String ID:
                                                                        • API String ID: 2591292051-0
                                                                        • Opcode ID: eaf1966addd412c8adb46732daa30fe53acfc2a4ba3b9ea53473202d2ad99d3a
                                                                        • Instruction ID: ed03e96225c9e65c0101fea7d31043fd0e14e34fbe7312bf790f16161e128fe4
                                                                        • Opcode Fuzzy Hash: eaf1966addd412c8adb46732daa30fe53acfc2a4ba3b9ea53473202d2ad99d3a
                                                                        • Instruction Fuzzy Hash: C51148B1800759DFCB20DFAAD445BDEBBF4EB48320F14841AE559A7740C338A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 007B98D6
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 05041968260767c14b5533f59a6ae23465d457e671f3e4f70b19f70afc93fc0f
                                                                        • Instruction ID: c6710e55da0da00b8d96d5cb39c9d3d820ff952c90640df202a25f8ce491b597
                                                                        • Opcode Fuzzy Hash: 05041968260767c14b5533f59a6ae23465d457e671f3e4f70b19f70afc93fc0f
                                                                        • Instruction Fuzzy Hash: 2A110FB1C006498FCB10DFAAD844BDEFBF4EF89324F14846AD929A7600C379A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08A39543
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: b9c77bf68d4482dffc88bc9c90e01a74c118f706dae04cd2cc5d7062bf95a403
                                                                        • Instruction ID: b69cbd2bd3bf0c4a04837f47a1ec7331a272facc7baeb81ed69b33216849152f
                                                                        • Opcode Fuzzy Hash: b9c77bf68d4482dffc88bc9c90e01a74c118f706dae04cd2cc5d7062bf95a403
                                                                        • Instruction Fuzzy Hash: 181110B5800249DFCB10DF9AC884BDEBFF8EB48320F148419E529A7610C775A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 007B98D6
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 8c12cdc650c9c11a86db0695d9a4299816d2336217059ff86c58b33fe67fd5e6
                                                                        • Instruction ID: d8c91fd607b10a4319b2c951ef09515fecc5fa60c62e495eddf1d8057333d85a
                                                                        • Opcode Fuzzy Hash: 8c12cdc650c9c11a86db0695d9a4299816d2336217059ff86c58b33fe67fd5e6
                                                                        • Instruction Fuzzy Hash: 5E11DFB5C006498FDB10DF9AD444BDEFBF8EB89324F14842AD529A7600C379A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?), ref: 007BFF9D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: 07a2e269c2e6280c2026ffcfda75a1ec5b451c44c5e31788b1b8a866840896ea
                                                                        • Instruction ID: f6faf9d88919b8fa0d4f4b2129fca0eaed14b4ae3d5f82d0fd16d616ceb126f4
                                                                        • Opcode Fuzzy Hash: 07a2e269c2e6280c2026ffcfda75a1ec5b451c44c5e31788b1b8a866840896ea
                                                                        • Instruction Fuzzy Hash: F01133B18003488FCB10DF99D885BDEFBF8EB48320F10841AE818A7741C378A944CFA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 08A399D5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: c08066181c1d27592693256ece67010abfa52a22e97a6ce973bf7f41fcbc73a4
                                                                        • Instruction ID: 98e8c612bb62b401e97e038733ad4b3966eec12b978408ad28837158b22901b6
                                                                        • Opcode Fuzzy Hash: c08066181c1d27592693256ece67010abfa52a22e97a6ce973bf7f41fcbc73a4
                                                                        • Instruction Fuzzy Hash: 6A11F5B58007499FCB10DF9AC885BDFBFF8EB49324F14845AE515A7600C374A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 08A3AB88
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.308284166.0000000008A30000.00000040.00000001.sdmp, Offset: 08A30000, based on PE: false
                                                                        Similarity
                                                                        • API ID: ChangeCloseFindNotification
                                                                        • String ID:
                                                                        • API String ID: 2591292051-0
                                                                        • Opcode ID: 099d51cf1bae0d8544d52109a8d74e71fa77446a14b234106b4bcedf3e012350
                                                                        • Instruction ID: d7106a7db620ed6dfb30a58c645497dcef0442d12222796f1fc0c55d46ab7818
                                                                        • Opcode Fuzzy Hash: 099d51cf1bae0d8544d52109a8d74e71fa77446a14b234106b4bcedf3e012350
                                                                        • Instruction Fuzzy Hash: 121115B1800759CFCB10DF9AC445BDEBBF4EB48324F14841AE559A7740D738A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?), ref: 007BFF9D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300973146.00000000007B0000.00000040.00000001.sdmp, Offset: 007B0000, based on PE: false
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: d7153ef569b553982b7a2c00b6c542c0477fcea5010a7a55b9dac61c76fb3d9a
                                                                        • Instruction ID: 0457727c00cdd257be01177316d2f2d42465a71bfb84afceca88b492f733be61
                                                                        • Opcode Fuzzy Hash: d7153ef569b553982b7a2c00b6c542c0477fcea5010a7a55b9dac61c76fb3d9a
                                                                        • Instruction Fuzzy Hash: 7011E2B5800249DFDB10DF9AD985BDEFBF8EB48724F10841AE919A7740C378A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300751011.00000000006ED000.00000040.00000001.sdmp, Offset: 006ED000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fbedf00569ba1916b7a0ceca19624812ac256c4d1351b45b714386abaff1d5e6
                                                                        • Instruction ID: 3c621ac89086297dcd6b26120223a766965d6ba68909c6c8d1d8c88e4216631d
                                                                        • Opcode Fuzzy Hash: fbedf00569ba1916b7a0ceca19624812ac256c4d1351b45b714386abaff1d5e6
                                                                        • Instruction Fuzzy Hash: 3D2128B2505380DFCF05DF14D9C0B26BBA6FB88314F2486A9E9094B246C336D816DB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300751011.00000000006ED000.00000040.00000001.sdmp, Offset: 006ED000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 17d711f86d3b93609c2d215cbbcdbadffad80ed85667759c21604f580dd9662f
                                                                        • Instruction ID: b372c7276b05f03bbfc2115877dd3d2c457bb3fc81548ca879708a64d02bf3e3
                                                                        • Opcode Fuzzy Hash: 17d711f86d3b93609c2d215cbbcdbadffad80ed85667759c21604f580dd9662f
                                                                        • Instruction Fuzzy Hash: B12125B2504380DFCF11DF14D9C0B26BF66FB88328F24C5A9E9054B246C336D856DBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300822227.000000000070D000.00000040.00000001.sdmp, Offset: 0070D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b06faca196382551da51c0c811c02b4912ee720f4a1db4667a7e3f1c7152986a
                                                                        • Instruction ID: c534d911580a37565157b885ce3f4a28cd9cb19c0e216e70a31d78ca8dac920c
                                                                        • Opcode Fuzzy Hash: b06faca196382551da51c0c811c02b4912ee720f4a1db4667a7e3f1c7152986a
                                                                        • Instruction Fuzzy Hash: A82107B1504304EFDB21DF94D9C0B26BBA5FB84314F24C6ADE9098B286C73ADC56CB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300822227.000000000070D000.00000040.00000001.sdmp, Offset: 0070D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5baf73bc773905378430590dfb531b88643c8848147598ff2ab8296d62f70a6a
                                                                        • Instruction ID: b582aeb1384edeeeef89106d384f3e1803f390f89ab6f86a67a33c32c4542f95
                                                                        • Opcode Fuzzy Hash: 5baf73bc773905378430590dfb531b88643c8848147598ff2ab8296d62f70a6a
                                                                        • Instruction Fuzzy Hash: 7D21D3B1604344DFDB24DF64D9C4B26BBA5EB84314F24C6A9E90D4B286C33ADC47CA61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300751011.00000000006ED000.00000040.00000001.sdmp, Offset: 006ED000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e2c2f5bde35ab7baba6a3d04d80a937590d4c4778a7de83aaafd933d226a14e4
                                                                        • Instruction ID: 9232c8d90f74d17847a9f6194b575d932966311b5cbf6faafe1f3607daf201a2
                                                                        • Opcode Fuzzy Hash: e2c2f5bde35ab7baba6a3d04d80a937590d4c4778a7de83aaafd933d226a14e4
                                                                        • Instruction Fuzzy Hash: 7E21AF76405280DFCF06CF14D9C4B56BF72FB88314F28C6A9D9480B656C33AD86ADB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300751011.00000000006ED000.00000040.00000001.sdmp, Offset: 006ED000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: db75533cb9b6fa6099b867bfc3a53cb548d3d4cf5ca75b8a66c096981064a356
                                                                        • Instruction ID: 18451a37ae6856a880d26ab5d9965a77e84693c9fdefeb90b8db239491c0e834
                                                                        • Opcode Fuzzy Hash: db75533cb9b6fa6099b867bfc3a53cb548d3d4cf5ca75b8a66c096981064a356
                                                                        • Instruction Fuzzy Hash: 9911B176404380DFCB11CF14D9C4B56BF72FB84324F24C6A9D8450B656C336D85ACBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300822227.000000000070D000.00000040.00000001.sdmp, Offset: 0070D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2843292ebbf6a814d7a2286815bab37d73136ec5010e940f27b85643756957ed
                                                                        • Instruction ID: 2a56a339fa8f848eaadc20ab342c558c392b95f19fcfbcafb6a3e6ba13960638
                                                                        • Opcode Fuzzy Hash: 2843292ebbf6a814d7a2286815bab37d73136ec5010e940f27b85643756957ed
                                                                        • Instruction Fuzzy Hash: A8119D75504384DFCB21CF54D5D4B15FBA1FB88324F28C6AAD8494B696C33AD84ACBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300822227.000000000070D000.00000040.00000001.sdmp, Offset: 0070D000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2843292ebbf6a814d7a2286815bab37d73136ec5010e940f27b85643756957ed
                                                                        • Instruction ID: ffd6e5c84a0678902da728ce25fc48435b76ce1756dc23556217a4ac29e0a5b8
                                                                        • Opcode Fuzzy Hash: 2843292ebbf6a814d7a2286815bab37d73136ec5010e940f27b85643756957ed
                                                                        • Instruction Fuzzy Hash: 1B118B75904380DFCB11DF54D5C4B15FBA1FB84324F28C6A9D8494B696C33AD85ACB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300751011.00000000006ED000.00000040.00000001.sdmp, Offset: 006ED000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 70f031b9d5caf76a9f2bfed007fb44c5cb6795a9cefb858dfd9d46e2944cf4e7
                                                                        • Instruction ID: e9bdca29cd14f0493c97a7b86e5fdeb634a650586464954122bbc10a1a6d54bf
                                                                        • Opcode Fuzzy Hash: 70f031b9d5caf76a9f2bfed007fb44c5cb6795a9cefb858dfd9d46e2944cf4e7
                                                                        • Instruction Fuzzy Hash: 6A01D67140A3C49BEF205B26CC847A7BB99EF41368F28C45AED095B386D3799C48C6B1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000E.00000002.300751011.00000000006ED000.00000040.00000001.sdmp, Offset: 006ED000, based on PE: false
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 53c4f8c3b457afc49b0620cb54e6af6464293885c5d3de98c632c2b9fa7582b3
                                                                        • Instruction ID: 04220c1ead811298a64743404b11f355cfc89ff3452182f58769106cbc150ca8
                                                                        • Opcode Fuzzy Hash: 53c4f8c3b457afc49b0620cb54e6af6464293885c5d3de98c632c2b9fa7582b3
                                                                        • Instruction Fuzzy Hash: 67F062724053849FEB108A16DCC4BA7FF98EB91734F18C45AED085B286C3789C48CAB1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Non-executed Functions