Loading ...

Play interactive tourEdit tour

Analysis Report B6LNCKjOGt5EmFQ.exe

Overview

General Information

Sample Name:B6LNCKjOGt5EmFQ.exe
Analysis ID:339499
MD5:80d255a6a5ec339e15d6fec3c0fef666
SHA1:bca665ff5a6a7084df2d424c0ed7fff3e141acbc
SHA256:3e48d983e3315501931c646f896a8189637f5b9d21c453b051cd17f2584ee3c4
Tags:exeYahoo

Most interesting Screenshot:

Detection

HawkEye AgentTesla MailPassView Matiex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected HawkEye Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM_3
Yara detected HawkEye Keylogger
Yara detected MailPassView
Yara detected Matiex Keylogger
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains strange resources
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

Startup

  • System is w10x64
  • B6LNCKjOGt5EmFQ.exe (PID: 6076 cmdline: 'C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe' MD5: 80D255A6A5EC339E15D6FEC3C0FEF666)
    • schtasks.exe (PID: 4812 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • B6LNCKjOGt5EmFQ.exe (PID: 5336 cmdline: {path} MD5: 80D255A6A5EC339E15D6FEC3C0FEF666)
      • LOGO AND PICTURES.exe (PID: 6208 cmdline: 'C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe' 0 MD5: D9001138C5119D936B70BF77E136AFBE)
        • netsh.exe (PID: 6184 cmdline: 'netsh' wlan show profile MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
          • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • Pictures.exe (PID: 6240 cmdline: 'C:\Users\user\AppData\Local\Temp\Pictures.exe' 0 MD5: 25146E9C5ECD498DD17BA01E6CFAEB24)
        • dw20.exe (PID: 6740 cmdline: dw20.exe -x -s 2184 MD5: 8D10DA8A3E11747E51F23C882C22BBC3)
        • vbc.exe (PID: 6836 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
        • vbc.exe (PID: 6848 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • PO456724392021.exe (PID: 6292 cmdline: 'C:\Users\user\AppData\Local\Temp\PO456724392021.exe' 0 MD5: F38E2D474C075EFF35B4EF81FDACA650)
      • PO2345714382021.exe (PID: 6488 cmdline: 'C:\Users\user\AppData\Local\Temp\PO2345714382021.exe' 0 MD5: 9B79DE8E3AD21F14E71E55CFA6AE4727)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}

Threatname: Agenttesla

{"Username: ": "", "URL: ": "", "To: ": "sales01@seedwellresources.xyz", "ByHost: ": "smtp.privateemail.com:5874", "Password: ": "", "From: ": "sales01@seedwellresources.xyz"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\PO456724392021.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    C:\Users\user\AppData\Local\Temp\PO2345714382021.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeJoeSecurity_MatiexYara detected Matiex KeyloggerJoe Security
        C:\Users\user\AppData\Local\Temp\Pictures.exeRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
        • 0x7b8f7:$key: HawkEyeKeylogger
        • 0x7db3b:$salt: 099u787978786
        • 0x7bf38:$string1: HawkEye_Keylogger
        • 0x7cd8b:$string1: HawkEye_Keylogger
        • 0x7da9b:$string1: HawkEye_Keylogger
        • 0x7c321:$string2: holdermail.txt
        • 0x7c341:$string2: holdermail.txt
        • 0x7c263:$string3: wallet.dat
        • 0x7c27b:$string3: wallet.dat
        • 0x7c291:$string3: wallet.dat
        • 0x7d65f:$string4: Keylog Records
        • 0x7d977:$string4: Keylog Records
        • 0x7db93:$string5: do not script -->
        • 0x7b8df:$string6: \pidloc.txt
        • 0x7b96d:$string7: BSPLIT
        • 0x7b97d:$string7: BSPLIT
        C:\Users\user\AppData\Local\Temp\Pictures.exeJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          Click to see the 3 entries

          Memory Dumps

          SourceRuleDescriptionAuthorStrings
          00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000014.00000002.308380033.0000000000400000.00000040.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  00000008.00000003.283351079.000000000134C000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 66 entries

                    Unpacked PEs

                    SourceRuleDescriptionAuthorStrings
                    12.0.PO456724392021.exe.ab0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      16.0.PO2345714382021.exe.5d0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                        12.2.PO456724392021.exe.ab0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                          19.2.vbc.exe.400000.0.raw.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
                            10.0.Pictures.exe.150000.0.unpackRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
                            • 0x7b8f7:$key: HawkEyeKeylogger
                            • 0x7db3b:$salt: 099u787978786
                            • 0x7bf38:$string1: HawkEye_Keylogger
                            • 0x7cd8b:$string1: HawkEye_Keylogger
                            • 0x7da9b:$string1: HawkEye_Keylogger
                            • 0x7c321:$string2: holdermail.txt
                            • 0x7c341:$string2: holdermail.txt
                            • 0x7c263:$string3: wallet.dat
                            • 0x7c27b:$string3: wallet.dat
                            • 0x7c291:$string3: wallet.dat
                            • 0x7d65f:$string4: Keylog Records
                            • 0x7d977:$string4: Keylog Records
                            • 0x7db93:$string5: do not script -->
                            • 0x7b8df:$string6: \pidloc.txt
                            • 0x7b96d:$string7: BSPLIT
                            • 0x7b97d:$string7: BSPLIT
                            Click to see the 20 entries

                            Sigma Overview

                            System Summary:

                            barindex
                            Sigma detected: Capture Wi-Fi passwordShow sources
                            Source: Process startedAuthor: Joe Security: Data: Command: 'netsh' wlan show profile, CommandLine: 'netsh' wlan show profile, CommandLine|base64offset|contains: V, Image: C:\Windows\SysWOW64\netsh.exe, NewProcessName: C:\Windows\SysWOW64\netsh.exe, OriginalFileName: C:\Windows\SysWOW64\netsh.exe, ParentCommandLine: 'C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe' 0, ParentImage: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe, ParentProcessId: 6208, ProcessCommandLine: 'netsh' wlan show profile, ProcessId: 6184
                            Sigma detected: Scheduled temp file as task from temp locationShow sources
                            Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe' , ParentImage: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe, ParentProcessId: 6076, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp', ProcessId: 4812

                            Signature Overview

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection:

                            barindex
                            Antivirus detection for dropped fileShow sources
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeAvira: detection malicious, Label: TR/Spy.Gen8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeAvira: detection malicious, Label: TR/Redcap.jajcu
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeAvira: detection malicious, Label: TR/AD.MExecute.lzrac
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeAvira: detection malicious, Label: SPR/Tool.MailPassView.473
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeAvira: detection malicious, Label: TR/Spy.Gen8
                            Found malware configurationShow sources
                            Source: Pictures.exe.6240.10.memstrMalware Configuration Extractor: HawkEye {"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}
                            Source: LOGO AND PICTURES.exe.6208.9.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "", "URL: ": "", "To: ": "sales01@seedwellresources.xyz", "ByHost: ": "smtp.privateemail.com:5874", "Password: ": "", "From: ": "sales01@seedwellresources.xyz"}
                            Multi AV Scanner detection for dropped fileShow sources
                            Source: C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exeReversingLabs: Detection: 26%
                            Multi AV Scanner detection for submitted fileShow sources
                            Source: B6LNCKjOGt5EmFQ.exeReversingLabs: Detection: 26%
                            Machine Learning detection for dropped fileShow sources
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeJoe Sandbox ML: detected
                            Machine Learning detection for sampleShow sources
                            Source: B6LNCKjOGt5EmFQ.exeJoe Sandbox ML: detected
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpackAvira: Label: TR/Redcap.jajcu
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                            Source: 10.0.Pictures.exe.150000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                            Source: 10.0.Pictures.exe.150000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                            Source: 10.2.Pictures.exe.150000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                            Source: 10.2.Pictures.exe.150000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                            Source: 9.0.LOGO AND PICTURES.exe.db0000.0.unpackAvira: Label: TR/Redcap.jajcu
                            Source: 9.2.LOGO AND PICTURES.exe.db0000.0.unpackAvira: Label: TR/Redcap.jajcu
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                            Source: unknownHTTPS traffic detected: 172.67.188.154:443 -> 192.168.2.3:49739 version: TLS 1.0
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Source: Binary string: \??\C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Pictures.exe, 0000000A.00000002.325931485.000000000093D000.00000004.00000020.sdmp
                            Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Pictures.exe
                            Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Pictures.exe
                            Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Pictures.exe
                            Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, LOGO AND PICTURES.exe
                            Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdbh} source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, LOGO AND PICTURES.exe, 00000009.00000002.604546258.0000000000DB2000.00000002.00020000.sdmp
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: autorun.inf
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: [autorun]
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpBinary or memory string: autorun.inf
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpBinary or memory string: [autorun]
                            Source: Pictures.exeBinary or memory string: autorun.inf
                            Source: Pictures.exeBinary or memory string: [autorun]
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then mov esp, ebp
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then jmp 00C91A73h
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then jmp 00C91A73h
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]

                            Networking:

                            barindex
                            May check the online IP address of the machineShow sources
                            Source: unknownDNS query: name: whatismyipaddress.com
                            Source: unknownDNS query: name: whatismyipaddress.com
                            Source: unknownDNS query: name: whatismyipaddress.com
                            Source: unknownDNS query: name: whatismyipaddress.com
                            Source: unknownDNS query: name: whatismyipaddress.com
                            Source: unknownDNS query: name: checkip.dyndns.org
                            Source: unknownDNS query: name: checkip.dyndns.org
                            Source: unknownDNS query: name: checkip.dyndns.org
                            Source: unknownDNS query: name: checkip.dyndns.org
                            Source: global trafficTCP traffic: 192.168.2.3:49738 -> 199.193.7.228:587
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                            Source: Joe Sandbox ViewIP Address: 104.16.154.36 104.16.154.36
                            Source: Joe Sandbox ViewIP Address: 131.186.161.70 131.186.161.70
                            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                            Source: global trafficTCP traffic: 192.168.2.3:49738 -> 199.193.7.228:587
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: unknownHTTPS traffic detected: 172.67.188.154:443 -> 192.168.2.3:49739 version: TLS 1.0
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                            Source: Pictures.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                            Source: unknownDNS traffic detected: queries for: 94.197.2.0.in-addr.arpa
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org/
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org/HB
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.459012991.0000000006ADF000.00000004.00000001.sdmpString found in binary or memory: http://crl.usertrusts
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0L
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.583245849.00000000092C1000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.583245849.00000000092C1000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.583245849.00000000092C1000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.280326164.0000000003651000.00000004.00000001.sdmp, LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.614076620.000000000348A000.00000004.00000001.sdmpString found in binary or memory: http://smtp.privateemail.com
                            Source: Pictures.exeString found in binary or memory: http://whatismyipaddress.com/
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/-
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000003.226742441.0000000001CAB000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeString found in binary or memory: http://www.nirsoft.net/
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=Createutf-8Win32_ComputerSystemModelManufactu
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611704602.0000000003299000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611704602.0000000003299000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611704602.0000000003299000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/84.17.52.74
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpString found in binary or memory: https://i.imgur.com/GJD7Q5y.png195.239.51.11795.26.248.2989.208.29.13389.187.165.4792.118.13.1895.26
                            Source: Pictures.exeString found in binary or memory: https://login.yahoo.com/config/login
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmp, LOGO AND PICTURES.exe, 00000009.00000002.611791578.00000000032B4000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpString found in binary or memory: https://www.geodatatool.com/en/?ip=
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.615373407.0000000003515000.00000004.00000001.sdmpString found in binary or memory: https://www.geodatatool.com/en/?ip=3D84.17.52.74=0D=0A=
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.612629984.00000000033B7000.00000004.00000001.sdmpString found in binary or memory: https://www.geodatatool.com/en/?ip=3D84.17.52.74=0D=0A=0D=0ADat=
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpString found in binary or memory: https://www.geodatatool.com/en/?ip=84.17.52.74
                            Source: Pictures.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

                            Key, Mouse, Clipboard, Microphone and Screen Capturing:

                            barindex
                            Yara detected HawkEye KeyloggerShow sources
                            Source: Yara matchFile source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: Pictures.exe PID: 6240, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPED
                            Source: Yara matchFile source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Contains functionality to log keystrokes (.Net Source)Show sources
                            Source: Pictures.exe.8.dr, Form1.cs.Net Code: HookKeyboard
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: HookKeyboard
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: HookKeyboard
                            Installs a global keyboard hookShow sources
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\Pictures.exe
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\PO456724392021.exe
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\PO2345714382021.exe
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.608636145.000000000151B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeWindow created: window name: CLIPBRDWNDCLASS
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeWindow created: window name: CLIPBRDWNDCLASS
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWindow created: window name: CLIPBRDWNDCLASS
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWindow created: window name: CLIPBRDWNDCLASS

                            System Summary:

                            barindex
                            Malicious sample detected (through community Yara rule)Show sources
                            Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPEDMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPEDMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                            .NET source code contains very large array initializationsShow sources
                            Source: 16.0.PO2345714382021.exe.5d0000.0.unpack, u003cPrivateImplementationDetailsu003eu007b8E6E7EF7u002dAC19u002d4F3Fu002d8489u002d4F7AD84D7DAFu007d/E4F05C4Eu002d2007u002d4C5Fu002dB313u002d78ABE577C964.csLarge array initialization: .cctor: array initializer size 11976
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A254E6 NtResumeThread,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A2543E NtQuerySystemInformation,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A2558E NtWriteVirtualMemory,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A253FA NtQuerySystemInformation,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A25561 NtWriteVirtualMemory,
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_01C5C4CC
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_01C5E463
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_01C5E470
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_01359754
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0135A3B8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0135A3A9
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0135A380
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030CF22A
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030CD1D8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030C0580
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030CDAA8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030CCE90
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030C10F8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030C1618
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030C0BE0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_030C8A38
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032183A0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032141E8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321E020
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321F7D8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032166E0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_03217A98
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321E808
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032178A8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321EFF0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_03211C30
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_03218390
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032141D8
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321E011
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321E01E
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321F778
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321E7A7
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032166D0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_032166DE
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_03215F38
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321EFE9
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_00DB73C0
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0015D426
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0015D523
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0016D5AE
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00167646
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001929BE
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00196AF4
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001BABFC
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001B3C4D
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001B3CBE
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0015ED03
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001B3D2F
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001B3DC0
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0015CF92
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0016AFA6
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00C96048
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00C95758
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00C98710
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00C91DA8
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00C97088
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_00C97098
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0018C7BC
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: String function: 0019BA9D appears 35 times
                            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2184
                            Source: Pictures.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                            Source: Pictures.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                            Source: Pictures.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.314008888.0000000008070000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.315076330.0000000008220000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameqSFGwNyTRHxXnFNQmReMEDLopGXKYkP.exed" vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBehbBNmlFodyWDcOLIcGKBGvXeAtKtoPsNVNJ.exe4 vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameaVGHPRrbHbSzmBgNIxPPIWutzHpjQGUX.exe4 vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameViottoBinder_Stub.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.314382538.00000000080D0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.314382538.00000000080D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameaVGHPRrbHbSzmBgNIxPPIWutzHpjQGUX.exe4 vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000002.300376997.0000000003850000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameqSFGwNyTRHxXnFNQmReMEDLopGXKYkP.exed" vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBehbBNmlFodyWDcOLIcGKBGvXeAtKtoPsNVNJ.exe4 vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000002.300352400.0000000003720000.00000002.00000001.sdmpBinary or memory string: originalfilename vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000002.300352400.0000000003720000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs B6LNCKjOGt5EmFQ.exe
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameViottoBinder_Stub.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX vs B6LNCKjOGt5EmFQ.exe
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeSection loaded: security.dll
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeSection loaded: security.dll
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                            Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPEDMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPEDMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                            Source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            Source: TcVfsyyjYuQ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            Source: Pictures.exe.8.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                            Source: Pictures.exe.8.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                            Source: Pictures.exe.8.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                            Source: Pictures.exe.8.dr, Form1.csCryptographic APIs: 'CreateDecryptor'
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                            Source: Pictures.exe.8.dr, Form1.csBase64 encoded string: 'jLDFXdPp/aSqMg8c6nmqYAnMHqu4RKPQmOX0IzUJgPUsVuhoSdvgoW9ev7/V5wH4fXvuYswWQ/LZ+ye1hqPRZw==', 'ybZRZ/CCW7udMx58FQTRrK9RIMwrfnmlR5Z83UvMyu30rrOEs1DzW7d2mK+Drn3u', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.csBase64 encoded string: 'jLDFXdPp/aSqMg8c6nmqYAnMHqu4RKPQmOX0IzUJgPUsVuhoSdvgoW9ev7/V5wH4fXvuYswWQ/LZ+ye1hqPRZw==', 'ybZRZ/CCW7udMx58FQTRrK9RIMwrfnmlR5Z83UvMyu30rrOEs1DzW7d2mK+Drn3u', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.csBase64 encoded string: 'jLDFXdPp/aSqMg8c6nmqYAnMHqu4RKPQmOX0IzUJgPUsVuhoSdvgoW9ev7/V5wH4fXvuYswWQ/LZ+ye1hqPRZw==', 'ybZRZ/CCW7udMx58FQTRrK9RIMwrfnmlR5Z83UvMyu30rrOEs1DzW7d2mK+Drn3u', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@25/14@49/5
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A24E52 AdjustTokenPrivileges,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A24E1B AdjustTokenPrivileges,
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exeJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6168:120:WilError_01
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeMutant created: \Sessions\1\BaseNamedObjects\WtsosTEBOBiSalvAHUcave
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_01
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDAC4.tmpJump to behavior
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hosts
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                            Source: B6LNCKjOGt5EmFQ.exeReversingLabs: Detection: 26%
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile read: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeJump to behavior
                            Source: unknownProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe 'C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe'
                            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp'
                            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: unknownProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe {path}
                            Source: unknownProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe {path}
                            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe 'C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe' 0
                            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Pictures.exe 'C:\Users\user\AppData\Local\Temp\Pictures.exe' 0
                            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\PO456724392021.exe 'C:\Users\user\AppData\Local\Temp\PO456724392021.exe' 0
                            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe 'C:\Users\user\AppData\Local\Temp\PO2345714382021.exe' 0
                            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2184
                            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                            Source: unknownProcess created: C:\Windows\SysWOW64\netsh.exe 'netsh' wlan show profile
                            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp'
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe {path}
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe {path}
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe 'C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe' 0
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\Pictures.exe 'C:\Users\user\AppData\Local\Temp\Pictures.exe' 0
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\PO456724392021.exe 'C:\Users\user\AppData\Local\Temp\PO456724392021.exe' 0
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe 'C:\Users\user\AppData\Local\Temp\PO2345714382021.exe' 0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess created: C:\Windows\SysWOW64\netsh.exe 'netsh' wlan show profile
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2184
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                            Source: B6LNCKjOGt5EmFQ.exeStatic file information: File size 1891328 > 1048576
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1cd000
                            Source: B6LNCKjOGt5EmFQ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Source: Binary string: \??\C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Pictures.exe, 0000000A.00000002.325931485.000000000093D000.00000004.00000020.sdmp
                            Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Pictures.exe
                            Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Pictures.exe
                            Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Pictures.exe
                            Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, LOGO AND PICTURES.exe
                            Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdbh} source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, LOGO AND PICTURES.exe, 00000009.00000002.604546258.0000000000DB2000.00000002.00020000.sdmp

                            Data Obfuscation:

                            barindex
                            .NET source code contains potential unpackerShow sources
                            Source: Pictures.exe.8.dr, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: Pictures.exe.8.dr, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: Pictures.exe.8.dr, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: Pictures.exe.8.dr, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_00FE4DDA push ebx; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_00FE2ECC push 205A0B4Ch; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_00FE6F30 push ecx; iretd
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_00FE5630 push ss; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 0_2_00FE6413 push ds; iretd
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 7_2_00516413 push ds; iretd
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 7_2_00515630 push ss; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 7_2_00516F30 push ecx; iretd
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 7_2_00514DDA push ebx; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 7_2_00512ECC push 205A0B4Ch; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 8_2_00AC2ECC push 205A0B4Ch; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 8_2_00AC4DDA push ebx; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 8_2_00AC5630 push ss; retf
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 8_2_00AC6F30 push ecx; iretd
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeCode function: 8_2_00AC6413 push ds; iretd
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_0321C471 push es; ret
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001C0712 push eax; ret
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_001C0712 push eax; ret
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0019BA9D push eax; ret
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_0019BA9D push eax; ret
                            Source: initial sampleStatic PE information: section name: .text entropy: 7.9172695107
                            Source: initial sampleStatic PE information: section name: .text entropy: 7.9172695107
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exeJump to dropped file
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Local\Temp\PO456724392021.exeJump to dropped file
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeJump to dropped file
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeJump to dropped file
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile created: C:\Users\user\AppData\Local\Temp\Pictures.exeJump to dropped file

                            Boot Survival:

                            barindex
                            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp'

                            Hooking and other Techniques for Hiding and Protection:

                            barindex
                            Changes the view of files in windows explorer (hidden files and folders)Show sources
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOGPFAULTERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess information set: NOGPFAULTERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion:

                            barindex
                            Yara detected AntiVM_3Show sources
                            Source: Yara matchFile source: 00000000.00000002.280603529.000000000369E000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFunction Chain: systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadAPCQueued,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,memAlloc,memAlloc,memAlloc,memAlloc,threadDelayed
                            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: GetAdaptersInfo,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: GetAdaptersInfo,
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeThread delayed: delay time: 300000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeThread delayed: delay time: 180000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeWindow / User API: threadDelayed 1362
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeWindow / User API: threadDelayed 8011
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWindow / User API: threadDelayed 3259
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWindow / User API: threadDelayed 6583
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWindow / User API: threadDelayed 586
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe TID: 2588Thread sleep time: -31500s >= -30000s
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe TID: 2588Thread sleep time: -95000s >= -30000s
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe TID: 5916Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -17524406870024063s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -200000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99797s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99672s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99563s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99438s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99297s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99172s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99063s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98938s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -197656s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -197438s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98594s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98485s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98344s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98235s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98125s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98016s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97891s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97750s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97641s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97500s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97391s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97250s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97141s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -194062s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96922s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96813s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96703s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96594s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96485s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96344s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96235s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99844s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99735s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99594s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99328s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99203s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -99094s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98578s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98469s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98360s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98188s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -98047s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97938s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97828s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97719s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97610s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97438s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97297s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -97156s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96844s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe TID: 6916Thread sleep time: -96688s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 6360Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 6708Thread sleep time: -120000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 6712Thread sleep time: -140000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 6720Thread sleep time: -300000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 7144Thread sleep time: -180000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 3920Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 3920Thread sleep time: -200000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exe TID: 3920Thread sleep time: -100000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exe TID: 5616Thread sleep time: -24903104499507879s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe TID: 7048Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe TID: 7048Thread sleep time: -3090000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe TID: 7048Thread sleep time: -60000s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe TID: 7048Thread sleep time: -39906s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe TID: 7048Thread sleep time: -39876s >= -30000s
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeLast function: Thread delayed
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile Volume queried: C:\ FullSizeInformation
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: VMware
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.517546136.000000000489B000.00000004.00000001.sdmpBinary or memory string: urrvPvzm3HwXvz1NTwLxXNfnvExFnrNIx7UVm/SmCD+FCHqemutVR/rFgT0wki9LPwg/
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.616596730.00000000042BB000.00000004.00000001.sdmpBinary or memory string: 5kJqdYbP21Rz2ptUM/x1qh7GFdJhiEB8hXnJNFU+GVEqzwoQhfmh2C9IQlQEMUDAfUYS
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: vmware
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.609664238.00000000015DB000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.616596730.00000000042BB000.00000004.00000001.sdmpBinary or memory string: fGg1mg3xoMngajQe6hGFSjiakAtVKJKH03ElOPVYoYRfwjC6jpmhdA54fgS3dC5Uyynp
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: VMWARE
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: VMware
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.517546136.000000000489B000.00000004.00000001.sdmpBinary or memory string: /ggrd5oGq/eeB+sMqIUNhgFsPAZg07EA648E+MdwgDWHGNbGZeuOQEaRKAT4+5AGWOOZ
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.282531714.0000000003AD7000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
                            Source: LOGO AND PICTURES.exe, 00000009.00000003.517546136.000000000489B000.00000004.00000001.sdmpBinary or memory string: c6+yJD9ToI4EDZ/YK22zNFx6n1EdIvMQeMutryjDZdN2xTZa3ITFDcse9N7K29CuP/2N
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess information queried: ProcessInformation
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess queried: DebugPort
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeCode function: 9_2_03211C30 LdrInitializeThunk,KiUserExceptionDispatcher,
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeProcess token adjusted: Debug
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeMemory allocated: page read and write | page guard

                            HIPS / PFW / Operating System Protection Evasion:

                            barindex
                            .NET source code references suspicious native API functionsShow sources
                            Source: Pictures.exe.8.dr, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                            Source: Pictures.exe.8.dr, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                            Source: 10.0.Pictures.exe.150000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                            Source: 10.0.Pictures.exe.150000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                            Source: 10.2.Pictures.exe.150000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                            Source: 10.2.Pictures.exe.150000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                            Source: 16.0.PO2345714382021.exe.5d0000.0.unpack, A/b2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                            Allocates memory in foreign processesShow sources
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
                            Injects a PE file into a foreign processesShow sources
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
                            Sample uses process hollowing techniqueShow sources
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
                            Writes to foreign memory regionsShow sources
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp'
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe {path}
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe {path}
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe 'C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe' 0
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\Pictures.exe 'C:\Users\user\AppData\Local\Temp\Pictures.exe' 0
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\PO456724392021.exe 'C:\Users\user\AppData\Local\Temp\PO456724392021.exe' 0
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeProcess created: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe 'C:\Users\user\AppData\Local\Temp\PO2345714382021.exe' 0
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess created: C:\Windows\SysWOW64\netsh.exe 'netsh' wlan show profile
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2184
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpBinary or memory string: Program Manager
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.610812522.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.610812522.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progman
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.610812522.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                            Source: LOGO AND PICTURES.exe, 00000009.00000002.614076620.000000000348A000.00000004.00000001.sdmpBinary or memory string: Program ManagerxQT
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Users\user\AppData\Local\Temp\PO456724392021.exe VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                            Lowering of HIPS / PFW / Operating System Security Settings:

                            barindex
                            Uses netsh to modify the Windows network and firewall settingsShow sources
                            Source: unknownProcess created: C:\Windows\SysWOW64\netsh.exe 'netsh' wlan show profile
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                            Stealing of Sensitive Information:

                            barindex
                            Yara detected AgentTeslaShow sources
                            Source: Yara matchFile source: 00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.283351079.000000000134C000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.289168879.0000000003E3C000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.287788541.00000000044BD000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.278201176.000000000138F000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.285048922.0000000004451000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000000.284660390.0000000000AB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.278060140.0000000001324000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000010.00000000.287649744.00000000005D2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.287852153.0000000003DD1000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.612763581.0000000002D81000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.604664953.0000000000AB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.286730546.00000000044BD000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.612958072.0000000002DD2000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\PO456724392021.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe, type: DROPPED
                            Source: Yara matchFile source: 12.0.PO456724392021.exe.ab0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 16.0.PO2345714382021.exe.5d0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.PO456724392021.exe.ab0000.0.unpack, type: UNPACKEDPE
                            Yara detected HawkEye KeyloggerShow sources
                            Source: Yara matchFile source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: Pictures.exe PID: 6240, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPED
                            Source: Yara matchFile source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Yara detected MailPassViewShow sources
                            Source: Yara matchFile source: 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.329671193.0000000003921000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000013.00000002.301913637.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: Pictures.exe PID: 6240, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPED
                            Source: Yara matchFile source: 19.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 19.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Yara detected Matiex KeyloggerShow sources
                            Source: Yara matchFile source: 00000009.00000002.604546258.0000000000DB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000009.00000000.281199501.0000000000DB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: LOGO AND PICTURES.exe PID: 6208, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe, type: DROPPED
                            Source: Yara matchFile source: 9.0.LOGO AND PICTURES.exe.db0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.2.LOGO AND PICTURES.exe.db0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                            Tries to harvest and steal WLAN passwordsShow sources
                            Source: unknownProcess created: C:\Windows\SysWOW64\netsh.exe 'netsh' wlan show profile
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeProcess created: C:\Windows\SysWOW64\netsh.exe 'netsh' wlan show profile
                            Tries to harvest and steal browser information (history, passwords, etc)Show sources
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                            Tries to harvest and steal ftp login credentialsShow sources
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                            Tries to steal Instant Messenger accounts or passwordsShow sources
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
                            Tries to steal Mail credentials (via file access)Show sources
                            Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                            Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                            Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                            Yara detected WebBrowserPassView password recovery toolShow sources
                            Source: Yara matchFile source: 00000014.00000002.308380033.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.329671193.0000000003921000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: Pictures.exe PID: 6240, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPED
                            Source: Yara matchFile source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 20.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 20.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.612763581.0000000002D81000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.612958072.0000000002DD2000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: LOGO AND PICTURES.exe PID: 6208, type: MEMORY

                            Remote Access Functionality:

                            barindex
                            Detected HawkEye RatShow sources
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
                            Source: B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
                            Source: B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
                            Source: Pictures.exeString found in binary or memory: HawkEye_Keylogger_Stealer_Records_
                            Source: Pictures.exeString found in binary or memory: HawkEyeKeylogger
                            Source: Pictures.exeString found in binary or memory: HawkEye_Keylogger_Keylog_Records_
                            Source: Pictures.exeString found in binary or memory: HawkEye_Keylogger_Execution_Confirmed_
                            Yara detected AgentTeslaShow sources
                            Source: Yara matchFile source: 00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.283351079.000000000134C000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.289168879.0000000003E3C000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.287788541.00000000044BD000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.278201176.000000000138F000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.285048922.0000000004451000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000000.284660390.0000000000AB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.278060140.0000000001324000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000010.00000000.287649744.00000000005D2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.287852153.0000000003DD1000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.612763581.0000000002D81000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.604664953.0000000000AB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.286730546.00000000044BD000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.612958072.0000000002DD2000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\PO456724392021.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe, type: DROPPED
                            Source: Yara matchFile source: 12.0.PO456724392021.exe.ab0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 16.0.PO2345714382021.exe.5d0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.PO456724392021.exe.ab0000.0.unpack, type: UNPACKEDPE
                            Yara detected HawkEye KeyloggerShow sources
                            Source: Yara matchFile source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: Pictures.exe PID: 6240, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pictures.exe, type: DROPPED
                            Source: Yara matchFile source: 10.0.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.Pictures.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Yara detected Matiex KeyloggerShow sources
                            Source: Yara matchFile source: 00000009.00000002.604546258.0000000000DB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000009.00000000.281199501.0000000000DB2000.00000002.00020000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: LOGO AND PICTURES.exe PID: 6208, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 6076, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: B6LNCKjOGt5EmFQ.exe PID: 5336, type: MEMORY
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe, type: DROPPED
                            Source: Yara matchFile source: 9.0.LOGO AND PICTURES.exe.db0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.2.LOGO AND PICTURES.exe.db0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A20A8E listen,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A20E9E bind,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A20E6B bind,
                            Source: C:\Users\user\AppData\Local\Temp\Pictures.exeCode function: 10_2_04A20A50 listen,

                            Mitre Att&ck Matrix

                            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                            Replication Through Removable Media1Windows Management Instrumentation231DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools21OS Credential Dumping2Peripheral Device Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                            Default AccountsNative API2Scheduled Task/Job1Access Token Manipulation1Deobfuscate/Decode Files or Information11Input Capture211File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                            Domain AccountsShared Modules1Logon Script (Windows)Process Injection412Obfuscated Files or Information41Credentials in Registry2System Information Discovery126SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                            Local AccountsScheduled Task/Job1Logon Script (Mac)Scheduled Task/Job1Software Packing13Credentials In Files1Query Registry1Distributed Component Object ModelInput Capture211Scheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
                            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsSecurity Software Discovery351SSHClipboard Data1Data Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                            Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsVirtualization/Sandbox Evasion16VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol23Jamming or Denial of ServiceAbuse Accessibility Features
                            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion16DCSyncProcess Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection412/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingSystem Network Configuration Discovery11Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                            Behavior Graph

                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 signatures2 2 Behavior Graph ID: 339499 Sample: B6LNCKjOGt5EmFQ.exe Startdate: 14/01/2021 Architecture: WINDOWS Score: 100 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 Antivirus detection for dropped file 2->81 83 22 other signatures 2->83 9 B6LNCKjOGt5EmFQ.exe 6 2->9         started        process3 file4 43 C:\Users\user\AppData\...\TcVfsyyjYuQ.exe, PE32 9->43 dropped 45 C:\Users\user\AppData\Local\...\tmpDAC4.tmp, XML 9->45 dropped 47 C:\Users\user\...\B6LNCKjOGt5EmFQ.exe.log, ASCII 9->47 dropped 12 B6LNCKjOGt5EmFQ.exe 5 9->12         started        16 schtasks.exe 1 9->16         started        18 B6LNCKjOGt5EmFQ.exe 9->18         started        process5 dnsIp6 69 192.168.2.1 unknown unknown 12->69 49 C:\Users\user\AppData\Local\...\Pictures.exe, PE32 12->49 dropped 51 C:\Users\user\AppData\...\PO456724392021.exe, PE32 12->51 dropped 53 C:\Users\user\AppData\...\PO2345714382021.exe, PE32 12->53 dropped 55 C:\Users\user\...\LOGO AND PICTURES.exe, PE32 12->55 dropped 20 Pictures.exe 15 6 12->20         started        24 PO2345714382021.exe 12->24         started        26 PO456724392021.exe 12->26         started        28 LOGO AND PICTURES.exe 14 5 12->28         started        30 conhost.exe 16->30         started        file7 process8 dnsIp9 57 94.197.2.0.in-addr.arpa 20->57 59 smtp.privateemail.com 199.193.7.228, 49738, 49744, 49745 NAMECHEAP-NETUS United States 20->59 61 whatismyipaddress.com 104.16.154.36, 49731, 80 CLOUDFLARENETUS United States 20->61 85 Antivirus detection for dropped file 20->85 87 Machine Learning detection for dropped file 20->87 89 Changes the view of files in windows explorer (hidden files and folders) 20->89 105 4 other signatures 20->105 32 vbc.exe 20->32         started        35 vbc.exe 20->35         started        37 dw20.exe 20->37         started        91 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->91 93 Tries to steal Mail credentials (via file access) 24->93 95 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 24->95 107 2 other signatures 24->107 97 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 26->97 99 Installs a global keyboard hook 26->99 63 checkip.dyndns.org 28->63 65 checkip.dyndns.com 131.186.161.70, 49733, 49737, 49740 DYNDNSUS United States 28->65 67 freegeoip.app 172.67.188.154, 443, 49739 CLOUDFLARENETUS United States 28->67 101 Tries to harvest and steal browser information (history, passwords, etc) 28->101 103 Tries to harvest and steal WLAN passwords 28->103 39 netsh.exe 28->39         started        signatures10 process11 signatures12 71 Tries to steal Instant Messenger accounts or passwords 32->71 73 Tries to steal Mail credentials (via file access) 32->73 75 Tries to harvest and steal browser information (history, passwords, etc) 35->75 41 conhost.exe 39->41         started        process13

                            Screenshots

                            Thumbnails

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                            windows-stand

                            Antivirus, Machine Learning and Genetic Malware Detection

                            Initial Sample

                            SourceDetectionScannerLabelLink
                            B6LNCKjOGt5EmFQ.exe26%ReversingLabsWin32.Trojan.Razy
                            B6LNCKjOGt5EmFQ.exe100%Joe Sandbox ML

                            Dropped Files

                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Local\Temp\PO2345714382021.exe100%AviraTR/Spy.Gen8
                            C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe100%AviraTR/Redcap.jajcu
                            C:\Users\user\AppData\Local\Temp\Pictures.exe100%AviraTR/AD.MExecute.lzrac
                            C:\Users\user\AppData\Local\Temp\Pictures.exe100%AviraSPR/Tool.MailPassView.473
                            C:\Users\user\AppData\Local\Temp\PO456724392021.exe100%AviraTR/Spy.Gen8
                            C:\Users\user\AppData\Local\Temp\PO2345714382021.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\Pictures.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\PO456724392021.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exe26%ReversingLabsWin32.Trojan.Razy

                            Unpacked PE Files

                            SourceDetectionScannerLabelLinkDownload
                            8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack100%AviraTR/Redcap.jajcuDownload File
                            8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                            8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                            8.2.B6LNCKjOGt5EmFQ.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                            12.0.PO456724392021.exe.ab0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                            16.0.PO2345714382021.exe.5d0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                            12.2.PO456724392021.exe.ab0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                            10.0.Pictures.exe.150000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                            10.0.Pictures.exe.150000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                            10.2.Pictures.exe.150000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                            10.2.Pictures.exe.150000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                            9.0.LOGO AND PICTURES.exe.db0000.0.unpack100%AviraTR/Redcap.jajcuDownload File
                            20.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
                            9.2.LOGO AND PICTURES.exe.db0000.0.unpack100%AviraTR/Redcap.jajcuDownload File

                            Domains

                            SourceDetectionScannerLabelLink
                            freegeoip.app1%VirustotalBrowse
                            checkip.dyndns.com0%VirustotalBrowse
                            checkip.dyndns.org0%VirustotalBrowse

                            URLs

                            SourceDetectionScannerLabelLink
                            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                            http://ocsp.sectigo.com00%URL Reputationsafe
                            http://ocsp.sectigo.com00%URL Reputationsafe
                            http://ocsp.sectigo.com00%URL Reputationsafe
                            https://freegeoip.app0%URL Reputationsafe
                            https://freegeoip.app0%URL Reputationsafe
                            https://freegeoip.app0%URL Reputationsafe
                            http://www.tiro.com0%URL Reputationsafe
                            http://www.tiro.com0%URL Reputationsafe
                            http://www.tiro.com0%URL Reputationsafe
                            http://ns.adobe.c/g0%URL Reputationsafe
                            http://ns.adobe.c/g0%URL Reputationsafe
                            http://ns.adobe.c/g0%URL Reputationsafe
                            http://www.goodfont.co.kr0%URL Reputationsafe
                            http://www.goodfont.co.kr0%URL Reputationsafe
                            http://www.goodfont.co.kr0%URL Reputationsafe
                            http://www.sajatypeworks.com0%URL Reputationsafe
                            http://www.sajatypeworks.com0%URL Reputationsafe
                            http://www.sajatypeworks.com0%URL Reputationsafe
                            http://www.typography.netD0%URL Reputationsafe
                            http://www.typography.netD0%URL Reputationsafe
                            http://www.typography.netD0%URL Reputationsafe
                            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                            http://fontfabrik.com0%URL Reputationsafe
                            http://fontfabrik.com0%URL Reputationsafe
                            http://fontfabrik.com0%URL Reputationsafe
                            http://checkip.dyndns.org/0%Avira URL Cloudsafe
                            http://crl.usertrusts0%Avira URL Cloudsafe
                            https://www.geodatatool.com/en/?ip=3D84.17.52.74=0D=0A=0%Avira URL Cloudsafe
                            https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/0%URL Reputationsafe
                            https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/0%URL Reputationsafe
                            https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/0%URL Reputationsafe
                            http://checkip.dyndns.org/HB0%Avira URL Cloudsafe
                            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                            http://www.sandoll.co.kr0%URL Reputationsafe
                            http://www.sandoll.co.kr0%URL Reputationsafe
                            http://www.sandoll.co.kr0%URL Reputationsafe
                            https://www.geodatatool.com/en/?ip=84.17.52.740%Avira URL Cloudsafe
                            http://www.urwpp.deDPlease0%URL Reputationsafe
                            http://www.urwpp.deDPlease0%URL Reputationsafe
                            http://www.urwpp.deDPlease0%URL Reputationsafe
                            http://www.zhongyicts.com.cn0%URL Reputationsafe
                            http://www.zhongyicts.com.cn0%URL Reputationsafe
                            http://www.zhongyicts.com.cn0%URL Reputationsafe
                            http://www.sakkal.com0%URL Reputationsafe
                            http://www.sakkal.com0%URL Reputationsafe
                            http://www.sakkal.com0%URL Reputationsafe
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                            https://freegeoip.app/xml/0%URL Reputationsafe
                            https://freegeoip.app/xml/0%URL Reputationsafe
                            https://freegeoip.app/xml/0%URL Reputationsafe
                            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                            https://sectigo.com/CPS00%URL Reputationsafe
                            https://sectigo.com/CPS00%URL Reputationsafe
                            https://sectigo.com/CPS00%URL Reputationsafe
                            http://ns.adobe.cobj0%URL Reputationsafe
                            http://ns.adobe.cobj0%URL Reputationsafe
                            http://ns.adobe.cobj0%URL Reputationsafe
                            https://www.geodatatool.com/en/?ip=0%URL Reputationsafe
                            https://www.geodatatool.com/en/?ip=0%URL Reputationsafe
                            https://www.geodatatool.com/en/?ip=0%URL Reputationsafe
                            http://www.carterandcone.coml0%URL Reputationsafe
                            http://www.carterandcone.coml0%URL Reputationsafe
                            http://www.carterandcone.coml0%URL Reputationsafe
                            http://www.founder.com.cn/cn0%URL Reputationsafe
                            http://www.founder.com.cn/cn0%URL Reputationsafe
                            http://www.founder.com.cn/cn0%URL Reputationsafe
                            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                            https://www.geodatatool.com/en/?ip=3D84.17.52.74=0D=0A=0D=0ADat=0%Avira URL Cloudsafe
                            https://freegeoip.app/xml/84.17.52.740%URL Reputationsafe
                            https://freegeoip.app/xml/84.17.52.740%URL Reputationsafe
                            https://freegeoip.app/xml/84.17.52.740%URL Reputationsafe
                            http://ns.ado/10%URL Reputationsafe
                            http://ns.ado/10%URL Reputationsafe
                            http://ns.ado/10%URL Reputationsafe

                            Domains and IPs

                            Contacted Domains

                            NameIPActiveMaliciousAntivirus DetectionReputation
                            whatismyipaddress.com
                            104.16.154.36
                            truefalse
                              high
                              freegeoip.app
                              172.67.188.154
                              truefalseunknown
                              smtp.privateemail.com
                              199.193.7.228
                              truefalse
                                high
                                checkip.dyndns.com
                                131.186.161.70
                                truefalseunknown
                                checkip.dyndns.org
                                unknown
                                unknowntrueunknown
                                94.197.2.0.in-addr.arpa
                                unknown
                                unknowntrue
                                  unknown

                                  Contacted URLs

                                  NameMaliciousAntivirus DetectionReputation
                                  http://checkip.dyndns.org/false
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://whatismyipaddress.com/false
                                    high

                                    URLs from Memory and Binaries

                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://www.fontbureau.com/designersGB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/?B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/bTheB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://ocsp.sectigo.com0LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers?B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                          high
                                          https://freegeoip.appLOGO AND PICTURES.exe, 00000009.00000002.611704602.0000000003299000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.tiro.comB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designersB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            high
                                            http://ns.adobe.c/gLOGO AND PICTURES.exe, 00000009.00000003.583245849.00000000092C1000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.goodfont.co.krB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sajatypeworks.comB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.typography.netDB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cn/cTheB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://fontfabrik.comB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://crl.usertrustsLOGO AND PICTURES.exe, 00000009.00000003.459012991.0000000006ADF000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.geodatatool.com/en/?ip=3D84.17.52.74=0D=0A=LOGO AND PICTURES.exe, 00000009.00000002.615373407.0000000003515000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://whatismyipaddress.com/-B6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/HBLOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleaseB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              https://api.telegram.org/bot/sendMessage?chat_id=&text=Createutf-8Win32_ComputerSystemModelManufactuLOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.ascendercorp.com/typedesigners.htmlB6LNCKjOGt5EmFQ.exe, 00000000.00000003.226742441.0000000001CAB000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://login.yahoo.com/config/loginPictures.exefalse
                                                  high
                                                  http://www.fonts.comB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.sandoll.co.krB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://www.geodatatool.com/en/?ip=84.17.52.74LOGO AND PICTURES.exe, 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.urwpp.deDPleaseB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.nirsoft.net/B6LNCKjOGt5EmFQ.exe, 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Pictures.exefalse
                                                      high
                                                      http://www.zhongyicts.com.cnB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameB6LNCKjOGt5EmFQ.exe, 00000000.00000002.280326164.0000000003651000.00000004.00000001.sdmp, LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.sakkal.comB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipB6LNCKjOGt5EmFQ.exe, 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, B6LNCKjOGt5EmFQ.exe, 00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://freegeoip.app/xml/LOGO AND PICTURES.exe, 00000009.00000002.611704602.0000000003299000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.apache.org/licenses/LICENSE-2.0B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                          high
                                                          http://www.fontbureau.comB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                            high
                                                            https://sectigo.com/CPS0LOGO AND PICTURES.exe, 00000009.00000003.425343136.0000000006AAC000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://ns.adobe.cobjLOGO AND PICTURES.exe, 00000009.00000003.583245849.00000000092C1000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.geodatatool.com/en/?ip=LOGO AND PICTURES.exe, 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://smtp.privateemail.comLOGO AND PICTURES.exe, 00000009.00000002.614076620.000000000348A000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://www.carterandcone.comlB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.fontbureau.com/designers/cabarga.htmlNB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                                high
                                                                http://www.founder.com.cn/cnB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.fontbureau.com/designers/frere-jones.htmlB6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                                  high
                                                                  http://www.jiyu-kobo.co.jp/B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.fontbureau.com/designers8B6LNCKjOGt5EmFQ.exe, 00000000.00000002.312118405.0000000006640000.00000002.00000001.sdmpfalse
                                                                    high
                                                                    https://www.geodatatool.com/en/?ip=3D84.17.52.74=0D=0A=0D=0ADat=LOGO AND PICTURES.exe, 00000009.00000002.612629984.00000000033B7000.00000004.00000001.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://i.imgur.com/GJD7Q5y.png195.239.51.11795.26.248.2989.208.29.13389.187.165.4792.118.13.1895.26LOGO AND PICTURES.exe, 00000009.00000002.611647538.0000000003261000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      https://freegeoip.app/xml/84.17.52.74LOGO AND PICTURES.exe, 00000009.00000002.611704602.0000000003299000.00000004.00000001.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      • URL Reputation: safe
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://ns.ado/1LOGO AND PICTURES.exe, 00000009.00000003.583245849.00000000092C1000.00000004.00000001.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      • URL Reputation: safe
                                                                      • URL Reputation: safe
                                                                      unknown

                                                                      Contacted IPs

                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs

                                                                      Public

                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.16.154.36
                                                                      unknownUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      131.186.161.70
                                                                      unknownUnited States
                                                                      33517DYNDNSUSfalse
                                                                      199.193.7.228
                                                                      unknownUnited States
                                                                      22612NAMECHEAP-NETUSfalse
                                                                      172.67.188.154
                                                                      unknownUnited States
                                                                      13335CLOUDFLARENETUSfalse

                                                                      Private

                                                                      IP
                                                                      192.168.2.1

                                                                      General Information

                                                                      Joe Sandbox Version:31.0.0 Red Diamond
                                                                      Analysis ID:339499
                                                                      Start date:14.01.2021
                                                                      Start time:07:58:25
                                                                      Joe Sandbox Product:CloudBasic
                                                                      Overall analysis duration:0h 15m 25s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:light
                                                                      Sample file name:B6LNCKjOGt5EmFQ.exe
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                      Number of analysed new started processes analysed:40
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • HDC enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Detection:MAL
                                                                      Classification:mal100.phis.troj.spyw.evad.winEXE@25/14@49/5
                                                                      EGA Information:Failed
                                                                      HDC Information:
                                                                      • Successful, ratio: 1.2% (good quality ratio 0.8%)
                                                                      • Quality average: 49.8%
                                                                      • Quality standard deviation: 36%
                                                                      HCA Information:
                                                                      • Successful, ratio: 99%
                                                                      • Number of executed functions: 0
                                                                      • Number of non-executed functions: 0
                                                                      Cookbook Comments:
                                                                      • Adjust boot time
                                                                      • Enable AMSI
                                                                      • Found application associated with file extension: .exe
                                                                      Warnings:
                                                                      Show All
                                                                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                                                      • TCP Packets have been reduced to 100
                                                                      • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.43.139.144, 92.122.144.200, 13.88.21.125, 67.27.157.126, 67.26.139.254, 67.27.159.254, 8.248.145.254, 8.253.204.120, 51.11.168.160, 92.122.213.247, 92.122.213.194, 20.54.26.129, 51.104.139.180, 52.155.217.156
                                                                      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                                                      Simulations

                                                                      Behavior and APIs

                                                                      TimeTypeDescription
                                                                      08:00:18API Interceptor2x Sleep call for process: B6LNCKjOGt5EmFQ.exe modified
                                                                      08:00:45API Interceptor24x Sleep call for process: Pictures.exe modified
                                                                      08:00:51API Interceptor274x Sleep call for process: PO2345714382021.exe modified
                                                                      08:00:56API Interceptor875x Sleep call for process: PO456724392021.exe modified
                                                                      08:00:59API Interceptor1x Sleep call for process: dw20.exe modified
                                                                      08:01:07API Interceptor836x Sleep call for process: LOGO AND PICTURES.exe modified

                                                                      Joe Sandbox View / Context

                                                                      IPs

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      104.16.154.36BANK-STATMENT _xlsx.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      INQUIRY.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      c9o0CtTIYT.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      6JLHKYvboo.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      khJdbt0clZ.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      ZMOKwXqVHO.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      5Av43Q5IXd.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      8oaZfXDstn.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      9vdouqRTh3.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      M9RhKQ1G91.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      0CyK3Y7XBs.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      pwYhlZGMa6.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      Vll6ZcOkEQ.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      oLHQIQAI3N.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      YrHUxpftPs.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      WuGzF7ZJ7P.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      cj9weNQmT2.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      lk5M5Q97c3.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      2v7Vtqfo81.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      Enquiry_pdf.exeGet hashmaliciousBrowse
                                                                      • whatismyipaddress.com/
                                                                      131.186.161.70wjSwL3KItA.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      PO_RFQ_2021_12_01.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      BxiS9KHIxj.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      04XP8gXrF7.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      F-007331.docGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      Quotation.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      F6D24k8j9o.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      umOXxQ9PFS.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      0d7Kt71o8B.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      bank Acct Numbr-pdf.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      Y17wLTA3DX.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      0908000090000.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      Purchase list- Karim Al-Dar Trading .exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      e8Ni2BqgDy.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      N5BJom1Uof.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      FACTURA DE PROFORMA.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      Detalles del banco.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      aral#U0131k---- ekstrenizz.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/
                                                                      t0xy1m153o.exeGet hashmaliciousBrowse
                                                                      • checkip.dyndns.org/

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      whatismyipaddress.comNDt93WWQwd089H7.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      JkhR5oeRHA.exeGet hashmaliciousBrowse
                                                                      • 66.171.248.178
                                                                      PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      BANK-STATMENT _xlsx.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      INQUIRY.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      Prueba de pago.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      879mgDuqEE.jarGet hashmaliciousBrowse
                                                                      • 66.171.248.178
                                                                      remittance1111.jarGet hashmaliciousBrowse
                                                                      • 66.171.248.178
                                                                      879mgDuqEE.jarGet hashmaliciousBrowse
                                                                      • 66.171.248.178
                                                                      remittance1111.jarGet hashmaliciousBrowse
                                                                      • 66.171.248.178
                                                                      https://my-alliances.co.uk/Get hashmaliciousBrowse
                                                                      • 66.171.248.178
                                                                      c9o0CtTIYT.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      mR3CdUkyLL.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      6JLHKYvboo.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      jSMd8npgmU.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      khJdbt0clZ.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      ZMOKwXqVHO.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      5Av43Q5IXd.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      8oaZfXDstn.exeGet hashmaliciousBrowse
                                                                      • 104.16.154.36
                                                                      RXk6PjNTN8.exeGet hashmaliciousBrowse
                                                                      • 104.16.155.36
                                                                      freegeoip.appIMG-0641.docGet hashmaliciousBrowse
                                                                      • 104.21.19.200
                                                                      a5T7dTsG4U.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 104.21.19.200
                                                                      80Iki3DsHA.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      QPR-1064.pdf.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.docGet hashmaliciousBrowse
                                                                      • 104.28.5.151
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      09000000000000h.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      PO-5042.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      onYLLDPXswyCVZu.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      PO-75013.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      ZwFwevQtlv.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      ssDV3d9O9o.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      wjSwL3KItA.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      SecuriteInfo.com.Generic.mg.5a4b41327cabca49.exeGet hashmaliciousBrowse
                                                                      • 104.28.5.151
                                                                      TD-10057.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      FedExAWB 772584418730.docGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      TD-10057.docGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      ndSscoDob9.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      smtp.privateemail.comSecuriteInfo.com.BehavesLike.Win32.Generic.cc.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      DHL-Address.xlsxGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      shipping-document.xlsxGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      iVUeQOg6LO.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      SecuriteInfo.com.Generic.mg.e92f0e2d08762687.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      DHL-document.xlsxGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      wCRnCAMZ3yT8BQ2.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      Mj1eX5GWJxDRnuk.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      SecuriteInfo.com.Trojan.Inject4.6535.8815.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      shipping document.xlsxGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      SecuriteInfo.com.Trojan.Inject4.6512.28917.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      p72kooG5ak.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      additional items.xlsxGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      swift copy 1f354972.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      DB_DHL_AWB_00117980920AD.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      Payment Advice - Advice Ref[G20376302776].pptx.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      Payment Reminder & SOA 202020121158.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      kg.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      logo.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228
                                                                      Pictures.exeGet hashmaliciousBrowse
                                                                      • 199.193.7.228

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      CLOUDFLARENETUSNEW ORDER_pdf.exeGet hashmaliciousBrowse
                                                                      • 23.227.38.74
                                                                      IMG-0641.docGet hashmaliciousBrowse
                                                                      • 104.21.19.200
                                                                      n1W2zlEddS.exeGet hashmaliciousBrowse
                                                                      • 104.21.15.4
                                                                      a5T7dTsG4U.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 104.21.19.200
                                                                      80Iki3DsHA.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      SecuriteInfo.com.Trojan.GenericKD.36094879.31571.exeGet hashmaliciousBrowse
                                                                      • 104.26.3.223
                                                                      Notice_Admin_Johnstoncompanies_8578.htmGet hashmaliciousBrowse
                                                                      • 172.67.70.208
                                                                      JdtN8nIcLi8RQOi.exeGet hashmaliciousBrowse
                                                                      • 104.18.45.60
                                                                      Chrome.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.232
                                                                      QPR-1064.pdf.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      Matrix.exeGet hashmaliciousBrowse
                                                                      • 172.67.134.127
                                                                      JAAkR51fQY.exeGet hashmaliciousBrowse
                                                                      • 104.21.13.175
                                                                      cremocompany-Invoice_216083-xlsx.htmlGet hashmaliciousBrowse
                                                                      • 104.16.19.94
                                                                      VANGUARD PAYMENT ADVICE.htmGet hashmaliciousBrowse
                                                                      • 104.31.67.162
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.docGet hashmaliciousBrowse
                                                                      • 104.28.5.151
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.exeGet hashmaliciousBrowse
                                                                      • 104.28.4.151
                                                                      sample20210113-01.xlsmGet hashmaliciousBrowse
                                                                      • 104.24.124.127
                                                                      Byrnes Gould PLLC.odtGet hashmaliciousBrowse
                                                                      • 104.16.19.94
                                                                      aNmkT4KLJX.exeGet hashmaliciousBrowse
                                                                      • 104.23.98.190
                                                                      DYNDNSUSIMG-0641.docGet hashmaliciousBrowse
                                                                      • 216.146.43.70
                                                                      a5T7dTsG4U.exeGet hashmaliciousBrowse
                                                                      • 162.88.193.70
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 162.88.193.70
                                                                      80Iki3DsHA.exeGet hashmaliciousBrowse
                                                                      • 162.88.193.70
                                                                      QPR-1064.pdf.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.71
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.docGet hashmaliciousBrowse
                                                                      • 131.186.113.70
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.71
                                                                      09000000000000h.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.70
                                                                      PO-5042.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.71
                                                                      onYLLDPXswyCVZu.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.70
                                                                      PO-75013.exeGet hashmaliciousBrowse
                                                                      • 162.88.193.70
                                                                      ZwFwevQtlv.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.71
                                                                      ssDV3d9O9o.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.71
                                                                      wjSwL3KItA.exeGet hashmaliciousBrowse
                                                                      • 131.186.161.70
                                                                      SecuriteInfo.com.Generic.mg.5a4b41327cabca49.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.70
                                                                      TD-10057.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.70
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 131.186.161.70
                                                                      FedExAWB 772584418730.docGet hashmaliciousBrowse
                                                                      • 131.186.113.70
                                                                      TD-10057.docGet hashmaliciousBrowse
                                                                      • 162.88.193.70
                                                                      ndSscoDob9.exeGet hashmaliciousBrowse
                                                                      • 216.146.43.71

                                                                      JA3 Fingerprints

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      54328bd36c14bd82ddaa0c04b25ed9ada5T7dTsG4U.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      80Iki3DsHA.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      SecuriteInfo.com.Trojan.GenericKD.36094879.31571.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      QPR-1064.pdf.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      IMG_2021_01_13_1_RFQ_PO_1832938.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      aNmkT4KLJX.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      09000000000000h.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      PO-5042.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      Geno_Quotation,pdf.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      onYLLDPXswyCVZu.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      PO-75013.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      ZwFwevQtlv.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      ssDV3d9O9o.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      wjSwL3KItA.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      Invoice-ID43739424297.vbsGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      Company Docs.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      SecuriteInfo.com.Generic.mg.5a4b41327cabca49.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      TD-10057.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154
                                                                      NKP210102-NIT-SC2.exeGet hashmaliciousBrowse
                                                                      • 172.67.188.154

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_pictures.exe_c756fdb369d16caee6eb4c4fc55eace42746ab1_00000000_1a3a4dea\Report.wer
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):16930
                                                                      Entropy (8bit):3.7534088968281503
                                                                      Encrypted:false
                                                                      SSDEEP:192:I+ugaMVvaKsn9fbeN9M2v1zzvSXk0ZKjBIcQry/u7snS274ItIn:9ugjaEdvh/sy/u7snX4Itg
                                                                      MD5:241EF4951F1724F8D1314BBFBB87465D
                                                                      SHA1:6BCBF070048674493FEBB07C204D05E998129610
                                                                      SHA-256:8EB667042376D717A87470D2AE0D383656CFB70BFE687BCCC80676683A25DB1D
                                                                      SHA-512:91AA5EF75A30C1FDF0DBE928849A484D82381F6491F99B7C7A1192786C66DDFC154E1D6F722C1924C274F32FC5F42EBE2161E42A1EF33CE764A073C6967A51D7
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.5.1.1.3.6.4.8.9.6.7.0.7.6.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.5.1.1.3.6.4.9.5.1.3.9.4.8.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.b.8.4.6.b.2.8.-.c.b.8.e.-.4.d.0.5.-.b.c.9.4.-.d.8.c.2.b.c.7.e.c.a.6.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.h.u.l.l.i...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.6.0.-.0.0.0.1.-.0.0.1.7.-.f.c.f.e.-.1.4.6.8.8.e.e.a.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.6.c.c.9.4.0.d.7.a.0.d.3.0.a.e.2.8.3.f.a.7.7.b.e.8.f.e.6.4.d.3.0.0.0.0.0.0.0.0.!.0.0.0.0.4.1.7.1.9.0.0.e.4.d.1.2.9.1.c.7.a.7.c.d.b.3.3.a.d.c.6.5.5.e.c.b.1.2.3.3.4.a.4.f.!.P.i.c.t.u.r.e.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.0././.1.2././.0.9.:.1.0.:.5.1.:.3.2.!.0.!.P.i.c.t.u.r.e.s...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.
                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER23EC.tmp.WERInternalMetadata.xml
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):7660
                                                                      Entropy (8bit):3.6954137341102586
                                                                      Encrypted:false
                                                                      SSDEEP:192:Rrl7r3GLNi+R6g4Oe6YAY6FOqVgmfZ61S4Cp1l41fz3m:RrlsNio6n6YX64YgmfQ1Shlifa
                                                                      MD5:752C895F9DCD8F46A421ED01FC3D9137
                                                                      SHA1:A0E2791563BE980CE3A52637CA0E67A5CA39AA77
                                                                      SHA-256:3EBD2A9B184072C0007CA004F0623800CA3884EDCE089E48F0FD80B57373B6D5
                                                                      SHA-512:177B74E6B738AA8AC40C5F95B2D488CDE311F72C76DAE55493665140F9396F9489FE64B5B21D73A310EA037C98B8650F2A769EBAE1C93A928BB23EB929467690
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.4.0.<./.P.i.d.>.......
                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2525.tmp.xml
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4674
                                                                      Entropy (8bit):4.439678899414447
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwSD8zsGJgtWI9+gWSC8Bn8fm8M4JFKC5FTso+q8v1XYt/xrvVXKd:uITfcBZSNqJFKvoK1YtJrvVXKd
                                                                      MD5:B3C65F177C1DEC134F2D225E3A86BB21
                                                                      SHA1:83F25E548BD0226D94AC22C57E582CBDEED12DFF
                                                                      SHA-256:B83847FA914868ED4AE188E38B5B9859232C7FA721DD1E979AA8476C683D2A8A
                                                                      SHA-512:88AE1BCF79CD03EA0B0A8502DB64431364BAE67ECD0375729D0BD26ACBF1D9E4C8079BAB37ADD7237383C0F1191F0883505171A8E7654534B15B7666CAEF056A
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="816551" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\B6LNCKjOGt5EmFQ.exe.log
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1216
                                                                      Entropy (8bit):5.355304211458859
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):456192
                                                                      Entropy (8bit):5.4162986566993
                                                                      Encrypted:false
                                                                      SSDEEP:3072:gbG/+hpzWouj0ce9wDRlZg80CEZU8BVfCXEMRWTjwNs5Pu:gC/+7Wouj7e6DRlZjYfCXEsWTj+qu
                                                                      MD5:D9001138C5119D936B70BF77E136AFBE
                                                                      SHA1:CFA2DBFF8527715EAAD00E91BD8955A8FFFC1224
                                                                      SHA-256:9AE5EF3FD4FEEA105C1ED3F1E69FD4FA328E8F29F1937097280F7EEE7F8D749E
                                                                      SHA-512:0187EC1EDE0022DAA4021A72D871CA0B7694B312BDBA1C31BF3C0667CE0255C51E9880170A4B5226E63C2BF48F53B8071F12B08C106B6B82EB1D5389C3F9D576
                                                                      Malicious:true
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe, Author: Joe Security
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Reputation:low
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_................................. ... ....@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......H...Xy..........@'...h.....................................................................................................................................................................RNK\ZJO@F.EYC.G.IOYKJ._R_CEESEPPlj}ez|"hzfSn`ssdh~DNwq//M\`tdv`|..;.....4......Ewqus._/.....V>..%9%(:&##b?`LLJN.56(,*:.}.2=4lwY_.............................................................................................................A.{YOLI..qAL.tTDY^..v^NY
                                                                      C:\Users\user\AppData\Local\Temp\PO2345714382021.exe
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):220672
                                                                      Entropy (8bit):6.060576428712888
                                                                      Encrypted:false
                                                                      SSDEEP:3072:zVQsV4phvec6kzCuJ5ufEUJdYi68Nl2xQzMfNlpmgVQoKPMXT3QECAJrYULCqv:zN49CaUXxN0AWNvmHoKPW3B0U
                                                                      MD5:9B79DE8E3AD21F14E71E55CFA6AE4727
                                                                      SHA1:3C2066345874FEBAFE281BBDE952D4F32D2ED53A
                                                                      SHA-256:56BD25ACDB97CE17F8351B926C48A4F63E348C40F6C5913219B0745D99F6B31D
                                                                      SHA-512:F922BE9228BAA1DAB85A5CFACFAFBB6E8C919009BB843B6CDBA0C2E24F6ABFCBE26417046BE248CCB41F820111633FDEE7C6EA5865A2FBCC3BCF22C52A7208E6
                                                                      Malicious:true
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe, Author: Joe Security
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y.._.................V...........u... ........@.. ....................................@..................................t..S.................................................................................... ............... ..H............text....U... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B.................t......H........................................................................(....*..(....*.s.........s.........s.........s.........*...0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0............+......,........,........,.+.+...(....(....*...0..(.........+......,........,........,.+.+..(....*.0..,.......
                                                                      C:\Users\user\AppData\Local\Temp\PO456724392021.exe
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):221696
                                                                      Entropy (8bit):6.062523365287507
                                                                      Encrypted:false
                                                                      SSDEEP:3072:099WeApgkpnx/kiKvzkGts4mhUi7Ergj7G0xQooD5oOpm8VQ5HABdXEPh6xtUiao:q8p7KvzApUbQ7xw9mbpABd08HU
                                                                      MD5:F38E2D474C075EFF35B4EF81FDACA650
                                                                      SHA1:13F869037C80BE3CD4736C5F67431161C79E5970
                                                                      SHA-256:F9EE81B7DEF0B0008CEF43847FB9BA520C0B57A49E7A71B47FF8D6EE1FEC4298
                                                                      SHA-512:B57A699E88F2ED2D83901BE6362663BFA98944A95E74F0E8D36622868A7AD04F9D557B617BD71A9A69FD7B7B1E7143EDEAAFF0A5E54D81311F78F8497FDEA649
                                                                      Malicious:true
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exe, Author: Joe Security
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.................X...........v... ........@.. ....................................@..................................u..S.......P............................................................................ ............... ..H............text...4V... ...X.................. ..`.rsrc...P............Z..............@..@.reloc...............`..............@..B.................v......H...........H.............................................................(....*..(....*.s.........s.........s.........s.........*...0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0............+......,........,........,.+.+...(....(....*...0..(.........+......,........,........,.+.+..(....*.0..,.......
                                                                      C:\Users\user\AppData\Local\Temp\Pictures.exe
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):533504
                                                                      Entropy (8bit):6.503670066564474
                                                                      Encrypted:false
                                                                      SSDEEP:6144:wuHqCVjDbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9u:/jDQtqB5urTIoYWBQk1E+VF9mOx90i
                                                                      MD5:25146E9C5ECD498DD17BA01E6CFAEB24
                                                                      SHA1:4171900E4D1291C7A7CDB33ADC655ECB12334A4F
                                                                      SHA-256:5207F3D079A52017E7977296C9EBA782D3D5EAE5ADEC94FA38ACDD88C184496D
                                                                      SHA-512:18374C6619B5F3D310DB43E5F81DB1333BDC9DC4086910FE2724A406D445CCBF5B16463B9341FBE718B2AAE9E929A2302655F3964EB64B47F2D80418B46E478F
                                                                      Malicious:true
                                                                      Yara Hits:
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: JPCERT/CC Incident Response Group
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4.._.....................4........... ........@.. ....................................@.....................................O.... ...2...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....2... ...2..................@..@.reloc.......`......."..............@..B........................H.......0}.................X...........................................2s..........*....0...........~......(......~....o....~....o..........9.......~....o.........+G~.....o......o........,)...........,.~.....~.....o....o.......................1.~.....~....o......o.....~....~....o....o......~.....(....s....o..........(.........*...................0.. .........(....(..........(.....o......*....................(......(.......o.......o.......o.......o......*.R..(....o....o......
                                                                      C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                      File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):2
                                                                      Entropy (8bit):1.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:Qn:Qn
                                                                      MD5:F3B25701FE362EC84616A93A45CE9998
                                                                      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                      Malicious:false
                                                                      Preview: ..
                                                                      C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1644
                                                                      Entropy (8bit):5.199929157081269
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBDqtn:cbh47TlNQ//rydbz9I3YODOLNdq3y
                                                                      MD5:AC43371F9BD7E88C08D426F7689595BE
                                                                      SHA1:E8FCA4BB37D5B2178D6FE2E4C99390CA78DC3C3E
                                                                      SHA-256:35EB8CB95831F8879793C40A8870F74F6F685C0F9CB711779382C609B7CDCDD8
                                                                      SHA-512:5E729C6EA9C5D1415AEA6C9241D5E01EBCE7B002CDC8AA09CDB51324E75BDFE08CBC0BCB423486FE51BFE5902763A78A66E01C48E14222CDC1E478419039128A
                                                                      Malicious:true
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                      C:\Users\user\AppData\Roaming\TcVfsyyjYuQ.exe
                                                                      Process:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):1891328
                                                                      Entropy (8bit):7.915566672587132
                                                                      Encrypted:false
                                                                      SSDEEP:49152:NHIhVUjx98WqWwDtMjLm2pwEFv0anoHMkL:NHlwWSMjLJwyv0a+h
                                                                      MD5:80D255A6A5EC339E15D6FEC3C0FEF666
                                                                      SHA1:BCA665FF5A6A7084DF2D424C0ED7FFF3E141ACBC
                                                                      SHA-256:3E48D983E3315501931C646F896A8189637F5B9D21C453B051CD17F2584EE3C4
                                                                      SHA-512:1BF61D60FC6646FF63786DA850B4118FB15DCC6F2C831A8A80D58225CF55BFEF395D69473AFEAE9D05F97C3ADCEDD90100C4266BC1D537B7F6D7F933CB6291C4
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 26%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_................................. ........@.. .......................@............@.....................................S............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......`#..(........... ...@h...........................................0..........*....0............}.....(.......(......r...p.(....(....(......{.....(....(......{....r...p.(....(....(......{.....(....(......{.....(....(......{.....(....(.....*...0..a........(.........(.....(..... .H+. ..Hua%....^E............s...................-.......M...........8...... ....Z O./^a+..(........ .%"Z .b&a+..-. 6...%+. ...%&.. ....Za8r..........,. .m.!%+. A.4m%&.. .=.Za8L...... .=.dZ -.
                                                                      C:\Users\user\AppData\Roaming\pid.txt
                                                                      Process:C:\Users\user\AppData\Local\Temp\Pictures.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4
                                                                      Entropy (8bit):2.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:fn:f
                                                                      MD5:405075699F065E43581F27D67BB68478
                                                                      SHA1:1A20CF59F0584ADA3DEEFF6C1C5B4C11C691AEC0
                                                                      SHA-256:7666197A246DDED3B8238775F3CEDF8350A2858A8117E744A703987DD55AA497
                                                                      SHA-512:C5EB5E284710FBC093BB55FEAE8A6623D0366DB40A03CBD399D7173E06641DAB84DAD3CF5C0DC330B727498688093B9A7FC884F7AFBE88C0627F963ADC61DEB1
                                                                      Malicious:false
                                                                      Preview: 6240
                                                                      C:\Users\user\AppData\Roaming\pidloc.txt
                                                                      Process:C:\Users\user\AppData\Local\Temp\Pictures.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):46
                                                                      Entropy (8bit):4.363038521594966
                                                                      Encrypted:false
                                                                      SSDEEP:3:oNWXp5cViE2J5xAIEN:oNWXp+N23fEN
                                                                      MD5:46833127CC4C64CFB8650EE775DC5D9D
                                                                      SHA1:F2B43FDAEAC18E55085436E55D9C30E2FD240386
                                                                      SHA-256:6F0942DBA73C781461E1E322E13537AB0F0EBE49D8C3DBD6CF9C23FC91404CBC
                                                                      SHA-512:FDDDBBEB26897D349E74B5E8DC9D0A256692378494E87E6F356AAE188C16C5481030B6F5545613FF2A4D5A5F775B85DE8DED3D347E15E404FD187EFC630783BA
                                                                      Malicious:false
                                                                      Preview: C:\Users\user\AppData\Local\Temp\Pictures.exe
                                                                      C:\Users\user\Documents\Matiex Keylogger\Screenshot.png
                                                                      Process:C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                      Category:dropped
                                                                      Size (bytes):5047425
                                                                      Entropy (8bit):7.94875017456693
                                                                      Encrypted:false
                                                                      SSDEEP:98304:PAcWjqWcHRM/gAcWjqWcHRM/gAcWjqWcHRM/5AcWjqWcHRM/5AcWjqWcHRM/+2Y+:Yfj8WJfj8WJfj8Wmfj8Wmfj8WaKgBFSz
                                                                      MD5:D9C9360766149464EAE529F4C0E8A50C
                                                                      SHA1:54E9BD21B7435FA52E9737B54AE1DE152B68C91C
                                                                      SHA-256:CA710E0EE8D9F14410F4FC9CB3B37086F33E2FC250CF1A140C24B0A8400D6C43
                                                                      SHA-512:41056162C6935FA584CFD907B42EF8DD7BADB3CC2C790B106092FDC6529E8DE7F2B8ED96F9D8DC7BD70586CC719FEEDA16339FF89FDC2E944F532069277FD275
                                                                      Malicious:false
                                                                      Preview: .PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...eE.....;..Q$.&c..... ..F_g.q^.fFf0..,F.Db.s.E0..DL.T..E.AD.&7..tC}.j..j...]..>..}....sN.UaWX..{..`...2..zv...1....1.._{...u..1....Xw.._..`../......l..._...]*c....mG....m`../.....b...._.>..e......z.cf..u....c.:J.M.C...4]h....Am.df..v....kT...*..Im..:......lS.;.~..].x.cf.g8.<..c..r.9..q:=j.H..x............T.jko....E!.......>...+x.X..+....k..b.....Y...........Y.o86x.#.C.~.../13._..`..........l.0.p..@6..d;.h....;..p..4.j6..h.\#K..b\.0.Q.`.$.w>s...D5?.<.JX_.Z..ZS.. .....?.....O..G....?...XY.GB.....CA} ...^c.Va.?@..m.!.'.....~..Q%:..}e..CG?[.m[P..(-.........[.4.=...t..p4.................?u1...R.eJ..r0.1....T.L.....l.......?b*....N.6.Zy*^..S.....8...b...=1..(}..T.l`*.. .......a}.kQ.hMm#:.......H.._.>.....Gxa.]..2.......J.B..C.O.C.g?T.y.G..t....Q\...l..mA}O....w4.4........4..G..}I..5-.).R.$hQ..]"...H[w........c.X.............@R.d.}..Lh@.H'?....V..?....9.a9.T..(.F.

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.915566672587132
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:B6LNCKjOGt5EmFQ.exe
                                                                      File size:1891328
                                                                      MD5:80d255a6a5ec339e15d6fec3c0fef666
                                                                      SHA1:bca665ff5a6a7084df2d424c0ed7fff3e141acbc
                                                                      SHA256:3e48d983e3315501931c646f896a8189637f5b9d21c453b051cd17f2584ee3c4
                                                                      SHA512:1bf61d60fc6646ff63786da850b4118fb15dcc6f2c831a8a80d58225cf55bfef395d69473afeae9d05f97c3adcedd90100c4266bc1d537b7f6d7f933cb6291c4
                                                                      SSDEEP:49152:NHIhVUjx98WqWwDtMjLm2pwEFv0anoHMkL:NHlwWSMjLJwyv0a+h
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_................................. ........@.. .......................@............@................................

                                                                      File Icon

                                                                      Icon Hash:00828e8e8686b000

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x5ceede
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x5FFF92AD [Thu Jan 14 00:39:09 2021 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1cee880x53.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d00000x610.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d20000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x1ccee40x1cd000False0.905138392252data7.9172695107IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x1d00000x6100x800False0.3896484375data4.7189568742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x1d20000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x1d00a00x384dataEnglishUnited States
                                                                      RT_MANIFEST0x1d04240x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      LegalCopyright3db75199 2251 4ce6 94e1 5f13d35d3b9f
                                                                      CompanyNameBreakingSecurity.net
                                                                      LegalTrademarks611d5f3a 1c65 419e a1cf 62fe3f64faf9
                                                                      Commentsdb14de2b 0bc1 4f57 9f45 3449e425f690
                                                                      ProductNameViottoBinder_Stub
                                                                      FileDescriptionfa8434f7 0c3e 4c84 9dd6 95b941e832e5
                                                                      Guid86f84c52-488a-487d-9083-479210c03845
                                                                      Translation0x0000 0x04e4

                                                                      Possible Origin

                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States

                                                                      Network Behavior

                                                                      Snort IDS Alerts

                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      01/14/21-07:59:54.284349TCP1201ATTACK-RESPONSES 403 Forbidden8049731104.16.154.36192.168.2.3

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 14, 2021 07:59:54.193475008 CET4973180192.168.2.3104.16.154.36
                                                                      Jan 14, 2021 07:59:54.233514071 CET8049731104.16.154.36192.168.2.3
                                                                      Jan 14, 2021 07:59:54.233608007 CET4973180192.168.2.3104.16.154.36
                                                                      Jan 14, 2021 07:59:54.235313892 CET4973180192.168.2.3104.16.154.36
                                                                      Jan 14, 2021 07:59:54.275219917 CET8049731104.16.154.36192.168.2.3
                                                                      Jan 14, 2021 07:59:54.284348965 CET8049731104.16.154.36192.168.2.3
                                                                      Jan 14, 2021 07:59:54.414906025 CET4973180192.168.2.3104.16.154.36
                                                                      Jan 14, 2021 08:00:01.699487925 CET4973380192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:04.712661982 CET4973380192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:04.860668898 CET8049733131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:04.861741066 CET4973380192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:04.861777067 CET4973380192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.010050058 CET8049733131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.010082960 CET8049733131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.010092974 CET8049733131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.010410070 CET4973380192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.015974998 CET4973380192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.164006948 CET8049733131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.240928888 CET4973780192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.389535904 CET8049737131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.389669895 CET4973780192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.390219927 CET4973780192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.538772106 CET8049737131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.539251089 CET8049737131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.539274931 CET8049737131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:05.539356947 CET4973780192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.539808035 CET4973780192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:05.688400984 CET8049737131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:08.455557108 CET4973180192.168.2.3104.16.154.36
                                                                      Jan 14, 2021 08:00:08.495773077 CET8049731104.16.154.36192.168.2.3
                                                                      Jan 14, 2021 08:00:08.495901108 CET4973180192.168.2.3104.16.154.36
                                                                      Jan 14, 2021 08:00:08.521887064 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:08.712308884 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:08.712419987 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:08.772363901 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:08.818191051 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:08.818346977 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:08.882314920 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:08.906934023 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:08.907265902 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:08.928133011 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:08.930773020 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:08.930797100 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:08.930990934 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:08.957525015 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:09.003372908 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:09.003599882 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:09.095568895 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:09.102688074 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.102705956 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.105675936 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:09.141305923 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:09.157989979 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:09.212981939 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:09.270381927 CET4974080192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.295670986 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.384603024 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:09.418406010 CET8049740131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:09.418521881 CET4974080192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.419497967 CET4974080192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.567349911 CET8049740131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:09.567424059 CET8049740131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:09.567435980 CET8049740131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:09.567512035 CET4974080192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.567805052 CET4974080192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.568572044 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:09.574563980 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.574583054 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.574599981 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.574671984 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:09.633825064 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:09.713150978 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:09.715703964 CET8049740131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:09.718214989 CET4974180192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.766267061 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.807080030 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:09.866115093 CET8049741131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:09.866534948 CET4974180192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.866982937 CET4974180192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:09.997090101 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.998270035 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.998295069 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:09.998413086 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:10.014882088 CET8049741131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:10.014935970 CET8049741131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:10.014949083 CET8049741131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:10.015129089 CET4974180192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:10.015634060 CET4974180192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:10.016644955 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:10.060599089 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:10.083353996 CET44349739172.67.188.154192.168.2.3
                                                                      Jan 14, 2021 08:00:10.163477898 CET8049741131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:10.181323051 CET4974280192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:10.213139057 CET49739443192.168.2.3172.67.188.154
                                                                      Jan 14, 2021 08:00:10.250571012 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:10.250998974 CET58749738199.193.7.228192.168.2.3
                                                                      Jan 14, 2021 08:00:10.256958008 CET49738587192.168.2.3199.193.7.228
                                                                      Jan 14, 2021 08:00:10.329204082 CET8049742131.186.161.70192.168.2.3
                                                                      Jan 14, 2021 08:00:10.329406023 CET4974280192.168.2.3131.186.161.70
                                                                      Jan 14, 2021 08:00:10.329763889 CET4974280192.168.2.3131.186.161.70

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 14, 2021 07:59:17.569272041 CET6511053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:17.617516994 CET53651108.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:18.408240080 CET5836153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:18.456034899 CET53583618.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:19.455475092 CET6349253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:19.506242037 CET53634928.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:21.099704981 CET6083153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:21.150368929 CET53608318.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:22.205271959 CET6010053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:22.336503029 CET53601008.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:23.258204937 CET5319553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:23.314742088 CET53531958.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:24.204947948 CET5014153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:24.255738020 CET53501418.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:25.102734089 CET5302353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:25.150680065 CET53530238.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:26.072304010 CET4956353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:27.069504023 CET4956353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:27.991471052 CET53495638.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:28.874310970 CET5135253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:28.922048092 CET53513528.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:29.666528940 CET5934953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:29.714510918 CET53593498.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:31.317909002 CET5708453192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:31.365736961 CET53570848.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:33.247423887 CET5882353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:33.295321941 CET53588238.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:34.474976063 CET5756853192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:34.522856951 CET53575688.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:43.063770056 CET5054053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:43.124294996 CET53505408.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:53.520191908 CET5436653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:53.576852083 CET53543668.8.8.8192.168.2.3
                                                                      Jan 14, 2021 07:59:54.102127075 CET5303453192.168.2.38.8.8.8
                                                                      Jan 14, 2021 07:59:54.158432007 CET53530348.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:00.889106035 CET5776253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:00.936932087 CET53577628.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:01.510406971 CET5543553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:01.558233976 CET53554358.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:01.582978010 CET5071353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:01.633629084 CET53507138.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:01.797789097 CET5613253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:01.853483915 CET53561328.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:03.690836906 CET5898753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:03.738687038 CET53589878.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:08.462229967 CET5657953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:08.520081043 CET53565798.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:08.704726934 CET6063353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:08.763041019 CET53606338.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:13.499056101 CET6129253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:13.556627989 CET53612928.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:22.471590996 CET6361953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:22.529303074 CET53636198.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:23.664125919 CET6493853192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:23.720735073 CET53649388.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:25.627404928 CET6194653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:25.686389923 CET53619468.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:27.092154980 CET6491053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:27.148614883 CET53649108.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:27.313196898 CET5212353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:27.372226954 CET53521238.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:28.614837885 CET5613053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:28.674099922 CET53561308.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:30.369122028 CET5633853192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:30.425196886 CET53563388.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:31.785188913 CET5942053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:31.841897964 CET53594208.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:32.113264084 CET5878453192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:32.169792891 CET53587848.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:34.010411024 CET6397853192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:34.058620930 CET53639788.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:37.266448975 CET6293853192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:37.325333118 CET53629388.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:37.704689026 CET5570853192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:37.735269070 CET5680353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:37.776067972 CET53557088.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:37.783068895 CET53568038.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:41.768898964 CET5714553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:41.825370073 CET53571458.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:42.182595015 CET5535953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:42.243969917 CET53553598.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:43.553025007 CET5830653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:43.610675097 CET53583068.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:46.228390932 CET6412453192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:46.285444021 CET53641248.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:47.262676001 CET4936153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:47.319166899 CET53493618.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:52.853676081 CET6315053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:52.910289049 CET53631508.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:00:57.864089966 CET5327953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:00:57.923175097 CET53532798.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:00.709014893 CET5688153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:00.766215086 CET53568818.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:01.422801971 CET5364253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:01.479815960 CET53536428.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:05.323237896 CET5566753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:05.374082088 CET53556678.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:06.387660027 CET5483353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:06.435551882 CET53548338.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:12.301712990 CET6247653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:12.357888937 CET53624768.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:13.643379927 CET4970553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:13.702507019 CET53497058.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:15.990230083 CET6147753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:16.041006088 CET53614778.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:17.256880045 CET6163353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:17.304717064 CET53616338.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:17.679095030 CET5594953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:17.729788065 CET53559498.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:18.167495966 CET5760153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:18.227045059 CET53576018.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:20.848212957 CET4934253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:20.899019003 CET53493428.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:25.163115978 CET5625353192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:25.222198963 CET53562538.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:27.366777897 CET4966753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:27.423219919 CET53496678.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:29.902163982 CET5543953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:29.950059891 CET53554398.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:34.008392096 CET5706953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:34.067707062 CET53570698.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:38.434175014 CET5765953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:38.490578890 CET53576598.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:41.304433107 CET5471753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:41.352474928 CET53547178.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:43.309600115 CET6397553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:43.365588903 CET53639758.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:47.604231119 CET5663953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:47.655323982 CET53566398.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:51.261096001 CET5185653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:51.309034109 CET53518568.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:52.632894039 CET5654653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:52.683711052 CET53565468.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:01:55.232933998 CET6215253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:01:55.283688068 CET53621528.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:01.687004089 CET5347053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:01.734879017 CET53534708.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:03.720463037 CET5644653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:03.776787043 CET53564468.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:06.874089003 CET5963153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:06.930296898 CET53596318.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:07.400751114 CET5551553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:07.457195997 CET53555158.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:08.036328077 CET6454753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:08.085427999 CET53645478.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:08.841780901 CET5175953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:08.892477989 CET53517598.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:08.928555965 CET5920753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:08.987667084 CET53592078.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:09.344995975 CET5426953192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:09.404113054 CET53542698.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:09.882831097 CET5485653192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:09.939145088 CET53548568.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:10.416321993 CET6414053192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:10.475392103 CET53641408.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:10.971044064 CET6227153192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:11.025665045 CET5740453192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:11.027297974 CET53622718.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:11.084976912 CET53574048.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:11.736547947 CET6299753192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:11.784336090 CET53629978.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:12.177129030 CET5771253192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:12.233146906 CET53577128.8.8.8192.168.2.3
                                                                      Jan 14, 2021 08:02:14.219427109 CET6006553192.168.2.38.8.8.8
                                                                      Jan 14, 2021 08:02:14.275495052 CET53600658.8.8.8192.168.2.3

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Jan 14, 2021 07:59:53.520191908 CET192.168.2.38.8.8.80x577cStandard query (0)94.197.2.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                                      Jan 14, 2021 07:59:54.102127075 CET192.168.2.38.8.8.80xf2dStandard query (0)whatismyipaddress.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.510406971 CET192.168.2.38.8.8.80xae5Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.582978010 CET192.168.2.38.8.8.80x2b6dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:08.462229967 CET192.168.2.38.8.8.80xe970Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:08.704726934 CET192.168.2.38.8.8.80xd6f8Standard query (0)freegeoip.appA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:22.471590996 CET192.168.2.38.8.8.80x9f9cStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:23.664125919 CET192.168.2.38.8.8.80x647Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:25.627404928 CET192.168.2.38.8.8.80x238aStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:27.092154980 CET192.168.2.38.8.8.80x26ebStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:27.313196898 CET192.168.2.38.8.8.80x7f29Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:28.614837885 CET192.168.2.38.8.8.80xe531Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:30.369122028 CET192.168.2.38.8.8.80xd404Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:31.785188913 CET192.168.2.38.8.8.80xaf23Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:32.113264084 CET192.168.2.38.8.8.80xf54dStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:34.010411024 CET192.168.2.38.8.8.80x9690Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:37.266448975 CET192.168.2.38.8.8.80x4c64Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:37.735269070 CET192.168.2.38.8.8.80x732cStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:41.768898964 CET192.168.2.38.8.8.80xa0a4Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:42.182595015 CET192.168.2.38.8.8.80x12daStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:46.228390932 CET192.168.2.38.8.8.80x1ce7Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:47.262676001 CET192.168.2.38.8.8.80x3e25Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:52.853676081 CET192.168.2.38.8.8.80x58abStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:57.864089966 CET192.168.2.38.8.8.80x8ab1Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:00.709014893 CET192.168.2.38.8.8.80x6063Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:01.422801971 CET192.168.2.38.8.8.80x7febStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:05.323237896 CET192.168.2.38.8.8.80x76e7Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:06.387660027 CET192.168.2.38.8.8.80x3bdbStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:12.301712990 CET192.168.2.38.8.8.80x625fStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:13.643379927 CET192.168.2.38.8.8.80x5369Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:17.256880045 CET192.168.2.38.8.8.80xebf3Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:18.167495966 CET192.168.2.38.8.8.80x676Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:20.848212957 CET192.168.2.38.8.8.80x8db1Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:25.163115978 CET192.168.2.38.8.8.80xabf5Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:27.366777897 CET192.168.2.38.8.8.80xdeb2Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:29.902163982 CET192.168.2.38.8.8.80xbe63Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:34.008392096 CET192.168.2.38.8.8.80x971cStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:38.434175014 CET192.168.2.38.8.8.80x97b9Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:41.304433107 CET192.168.2.38.8.8.80xdc66Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:43.309600115 CET192.168.2.38.8.8.80x88bcStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:47.604231119 CET192.168.2.38.8.8.80xdf13Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:51.261096001 CET192.168.2.38.8.8.80xce33Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:52.632894039 CET192.168.2.38.8.8.80x94fcStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:55.232933998 CET192.168.2.38.8.8.80x51e6Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:01.687004089 CET192.168.2.38.8.8.80x5fc3Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:03.720463037 CET192.168.2.38.8.8.80x1935Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:08.928555965 CET192.168.2.38.8.8.80x2d3fStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:10.971044064 CET192.168.2.38.8.8.80x4489Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:14.219427109 CET192.168.2.38.8.8.80x4c3eStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Jan 14, 2021 07:59:53.576852083 CET8.8.8.8192.168.2.30x577cName error (3)94.197.2.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                                      Jan 14, 2021 07:59:54.158432007 CET8.8.8.8192.168.2.30xf2dNo error (0)whatismyipaddress.com104.16.154.36A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 07:59:54.158432007 CET8.8.8.8192.168.2.30xf2dNo error (0)whatismyipaddress.com104.16.155.36A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.558233976 CET8.8.8.8192.168.2.30xae5No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.558233976 CET8.8.8.8192.168.2.30xae5No error (0)checkip.dyndns.com131.186.161.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.558233976 CET8.8.8.8192.168.2.30xae5No error (0)checkip.dyndns.com131.186.113.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.558233976 CET8.8.8.8192.168.2.30xae5No error (0)checkip.dyndns.com216.146.43.71A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.558233976 CET8.8.8.8192.168.2.30xae5No error (0)checkip.dyndns.com216.146.43.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.558233976 CET8.8.8.8192.168.2.30xae5No error (0)checkip.dyndns.com162.88.193.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.633629084 CET8.8.8.8192.168.2.30x2b6dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.633629084 CET8.8.8.8192.168.2.30x2b6dNo error (0)checkip.dyndns.com131.186.113.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.633629084 CET8.8.8.8192.168.2.30x2b6dNo error (0)checkip.dyndns.com131.186.161.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.633629084 CET8.8.8.8192.168.2.30x2b6dNo error (0)checkip.dyndns.com216.146.43.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.633629084 CET8.8.8.8192.168.2.30x2b6dNo error (0)checkip.dyndns.com162.88.193.70A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:01.633629084 CET8.8.8.8192.168.2.30x2b6dNo error (0)checkip.dyndns.com216.146.43.71A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:08.520081043 CET8.8.8.8192.168.2.30xe970No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:08.763041019 CET8.8.8.8192.168.2.30xd6f8No error (0)freegeoip.app172.67.188.154A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:08.763041019 CET8.8.8.8192.168.2.30xd6f8No error (0)freegeoip.app104.21.19.200A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:22.529303074 CET8.8.8.8192.168.2.30x9f9cNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:23.720735073 CET8.8.8.8192.168.2.30x647No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:25.686389923 CET8.8.8.8192.168.2.30x238aNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:27.148614883 CET8.8.8.8192.168.2.30x26ebNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:27.372226954 CET8.8.8.8192.168.2.30x7f29No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:28.674099922 CET8.8.8.8192.168.2.30xe531No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:30.425196886 CET8.8.8.8192.168.2.30xd404No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:31.841897964 CET8.8.8.8192.168.2.30xaf23No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:32.169792891 CET8.8.8.8192.168.2.30xf54dNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:34.058620930 CET8.8.8.8192.168.2.30x9690No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:37.325333118 CET8.8.8.8192.168.2.30x4c64No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:37.783068895 CET8.8.8.8192.168.2.30x732cNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:41.825370073 CET8.8.8.8192.168.2.30xa0a4No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:42.243969917 CET8.8.8.8192.168.2.30x12daNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:46.285444021 CET8.8.8.8192.168.2.30x1ce7No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:47.319166899 CET8.8.8.8192.168.2.30x3e25No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:52.910289049 CET8.8.8.8192.168.2.30x58abNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:00:57.923175097 CET8.8.8.8192.168.2.30x8ab1No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:00.766215086 CET8.8.8.8192.168.2.30x6063No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:01.479815960 CET8.8.8.8192.168.2.30x7febNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:05.374082088 CET8.8.8.8192.168.2.30x76e7No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:06.435551882 CET8.8.8.8192.168.2.30x3bdbNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:12.357888937 CET8.8.8.8192.168.2.30x625fNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:13.702507019 CET8.8.8.8192.168.2.30x5369No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:17.304717064 CET8.8.8.8192.168.2.30xebf3No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:18.227045059 CET8.8.8.8192.168.2.30x676No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:20.899019003 CET8.8.8.8192.168.2.30x8db1No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:25.222198963 CET8.8.8.8192.168.2.30xabf5No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:27.423219919 CET8.8.8.8192.168.2.30xdeb2No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:29.950059891 CET8.8.8.8192.168.2.30xbe63No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:34.067707062 CET8.8.8.8192.168.2.30x971cNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:38.490578890 CET8.8.8.8192.168.2.30x97b9No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:41.352474928 CET8.8.8.8192.168.2.30xdc66No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:43.365588903 CET8.8.8.8192.168.2.30x88bcNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:47.655323982 CET8.8.8.8192.168.2.30xdf13No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:51.309034109 CET8.8.8.8192.168.2.30xce33No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:52.683711052 CET8.8.8.8192.168.2.30x94fcNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:01:55.283688068 CET8.8.8.8192.168.2.30x51e6No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:01.734879017 CET8.8.8.8192.168.2.30x5fc3No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:03.776787043 CET8.8.8.8192.168.2.30x1935No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:08.987667084 CET8.8.8.8192.168.2.30x2d3fNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:11.027297974 CET8.8.8.8192.168.2.30x4489No error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)
                                                                      Jan 14, 2021 08:02:14.275495052 CET8.8.8.8192.168.2.30x4c3eNo error (0)smtp.privateemail.com199.193.7.228A (IP address)IN (0x0001)

                                                                      HTTP Request Dependency Graph

                                                                      • whatismyipaddress.com
                                                                      • checkip.dyndns.org

                                                                      HTTP Packets

                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      0192.168.2.349731104.16.154.3680C:\Users\user\AppData\Local\Temp\Pictures.exe
                                                                      TimestampkBytes transferredDirectionData
                                                                      Jan 14, 2021 07:59:54.235313892 CET623OUTGET / HTTP/1.1
                                                                      Host: whatismyipaddress.com
                                                                      Connection: Keep-Alive
                                                                      Jan 14, 2021 07:59:54.284348965 CET623INHTTP/1.1 403 Forbidden
                                                                      Date: Thu, 14 Jan 2021 06:59:54 GMT
                                                                      Content-Type: text/plain; charset=UTF-8
                                                                      Content-Length: 16
                                                                      Connection: keep-alive
                                                                      X-Frame-Options: SAMEORIGIN
                                                                      Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                      Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                      Set-Cookie: __cfduid=d6cdf8dda2a1ce45b2173b3d3a4bb7f411610607594; expires=Sat, 13-Feb-21 06:59:54 GMT; path=/; domain=.whatismyipaddress.com; HttpOnly; SameSite=Lax; Secure
                                                                      cf-request-id: 07a14aa31c0000c2e532b0b000000001
                                                                      Server: cloudflare
                                                                      CF-RAY: 61157a182acec2e5-FRA
                                                                      Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
                                                                      Data Ascii: error code: 1020


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      1192.168.2.349733131.186.161.7080C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      TimestampkBytes transferredDirectionData
                                                                      Jan 14, 2021 08:00:04.861777067 CET677OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 14, 2021 08:00:05.010082960 CET677INHTTP/1.1 200 OK
                                                                      Content-Type: text/html
                                                                      Server: DynDNS-CheckIP/1.0.1
                                                                      Connection: close
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Content-Length: 103
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.74</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      2192.168.2.349737131.186.161.7080C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      TimestampkBytes transferredDirectionData
                                                                      Jan 14, 2021 08:00:05.390219927 CET678OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 14, 2021 08:00:05.539251089 CET678INHTTP/1.1 200 OK
                                                                      Content-Type: text/html
                                                                      Server: DynDNS-CheckIP/1.0.1
                                                                      Connection: close
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Content-Length: 103
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.74</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      3192.168.2.349740131.186.161.7080C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      TimestampkBytes transferredDirectionData
                                                                      Jan 14, 2021 08:00:09.419497967 CET686OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 14, 2021 08:00:09.567424059 CET686INHTTP/1.1 200 OK
                                                                      Content-Type: text/html
                                                                      Server: DynDNS-CheckIP/1.0.1
                                                                      Connection: close
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Content-Length: 103
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.74</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      4192.168.2.349741131.186.161.7080C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      TimestampkBytes transferredDirectionData
                                                                      Jan 14, 2021 08:00:09.866982937 CET693OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 14, 2021 08:00:10.014935970 CET694INHTTP/1.1 200 OK
                                                                      Content-Type: text/html
                                                                      Server: DynDNS-CheckIP/1.0.1
                                                                      Connection: close
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Content-Length: 103
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.74</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      5192.168.2.349742131.186.161.7080C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      TimestampkBytes transferredDirectionData
                                                                      Jan 14, 2021 08:00:10.329763889 CET698OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 14, 2021 08:00:10.477866888 CET698INHTTP/1.1 200 OK
                                                                      Content-Type: text/html
                                                                      Server: DynDNS-CheckIP/1.0.1
                                                                      Connection: close
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Content-Length: 103
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.74</body></html>


                                                                      HTTPS Packets

                                                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                      Jan 14, 2021 08:00:08.930797100 CET172.67.188.154443192.168.2.349739CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Aug 10 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Tue Aug 10 14:00:00 CEST 2021 Wed Jan 01 00:59:59 CET 2025769,49162-49161-49172-49171-53-47-10,0-10-11-35-23-65281,29-23-24,054328bd36c14bd82ddaa0c04b25ed9ad
                                                                      CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                                                                      SMTP Packets

                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Jan 14, 2021 08:00:08.906934023 CET58749738199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:08.907265902 CET49738587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:09.102705956 CET58749738199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:09.105675936 CET49738587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:09.295670986 CET58749738199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:22.958322048 CET58749744199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:22.958880901 CET49744587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:22.959043026 CET58749745199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:22.959383965 CET49745587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:23.149359941 CET58749744199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:23.149823904 CET58749745199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:23.443073988 CET58749746199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:23.445048094 CET49746587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:23.446057081 CET58749747199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:23.446501017 CET49747587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:23.635618925 CET58749746199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:23.637448072 CET58749747199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:23.638699055 CET49747587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:23.828748941 CET58749747199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:24.110033989 CET58749748199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:24.110730886 CET49748587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:24.300975084 CET58749748199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:24.301374912 CET49748587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:24.435529947 CET58749749199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:24.435818911 CET49749587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:24.491446972 CET58749748199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:24.626451969 CET58749749199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:24.626929998 CET49749587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:24.817307949 CET58749749199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:25.135715961 CET58749750199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:25.136117935 CET49750587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:25.326111078 CET58749750199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:25.326412916 CET49750587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:25.516190052 CET58749750199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:26.070705891 CET58749751199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:26.081401110 CET49751587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:26.271816015 CET58749751199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:26.274288893 CET49751587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:26.464620113 CET58749751199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:26.638529062 CET58749752199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:26.638777018 CET49752587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:26.829519033 CET58749752199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:26.829797029 CET49752587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:27.020015955 CET58749752199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:27.538213015 CET58749753199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:27.540309906 CET49753587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:27.731218100 CET58749753199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:27.731501102 CET49753587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:27.756948948 CET58749754199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:27.757746935 CET49754587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:27.921510935 CET58749753199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:27.948188066 CET58749754199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:27.948502064 CET49754587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:28.138797998 CET58749754199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:28.197808027 CET58749755199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:28.198223114 CET49755587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:28.388714075 CET58749755199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:28.388906002 CET49755587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:28.579099894 CET58749755199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:29.063112020 CET58749756199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:29.063569069 CET49756587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:29.253979921 CET58749756199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:29.254336119 CET49756587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:29.444499969 CET58749756199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:29.783775091 CET58749757199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:29.784033060 CET49757587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:29.974598885 CET58749757199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:29.974828005 CET49757587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:30.165138006 CET58749757199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:30.812020063 CET58749758199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:30.812251091 CET49758587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:31.003150940 CET58749758199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:31.003526926 CET49758587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:31.193689108 CET58749758199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:31.492677927 CET58749759199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:31.492913961 CET49759587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:31.682878017 CET58749759199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:31.683123112 CET49759587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:31.873045921 CET58749759199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:32.227066040 CET58749760199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:32.227708101 CET49760587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:32.418627977 CET58749760199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:32.419456005 CET49760587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:32.560264111 CET58749761199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:32.561613083 CET49761587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:32.609837055 CET58749760199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:32.752177954 CET58749761199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:32.752501011 CET49761587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:32.968230009 CET58749761199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:33.468945026 CET58749762199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:33.512440920 CET49762587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:33.702641964 CET58749762199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:33.702919006 CET49762587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:33.892878056 CET58749762199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:34.443994999 CET58749763199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:34.810471058 CET49763587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:35.001105070 CET58749763199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:35.001420975 CET49763587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:35.191286087 CET58749763199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:35.651307106 CET58749764199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:36.264903069 CET49764587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:36.455297947 CET58749764199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:36.455629110 CET49764587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:36.645940065 CET58749764199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:37.709633112 CET58749765199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:37.709914923 CET49765587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:37.901084900 CET58749765199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:37.901420116 CET49765587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:38.092577934 CET58749765199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:38.167083025 CET58749767199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:38.167381048 CET49767587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:38.357604980 CET58749767199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:38.358040094 CET49767587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:38.548203945 CET58749767199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:38.580416918 CET58749768199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:38.580915928 CET49768587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:38.771435976 CET58749768199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:38.774426937 CET49768587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:38.964509964 CET58749768199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:39.755696058 CET58749769199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:39.892252922 CET49769587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:40.082479954 CET58749769199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:40.879084110 CET49769587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:41.069070101 CET58749769199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:42.214993954 CET58749770199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:42.215277910 CET49770587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:42.405487061 CET58749770199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:42.406028032 CET49770587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:42.596146107 CET58749770199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:42.628251076 CET58749771199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:42.628550053 CET49771587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:42.818723917 CET58749771199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:42.818973064 CET49771587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:43.009176016 CET58749771199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:44.974253893 CET58749777199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:44.974579096 CET49777587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:45.165414095 CET58749777199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:45.165735960 CET49777587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:45.355920076 CET58749777199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:46.670711040 CET58749778199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:46.671047926 CET49778587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:46.861597061 CET58749778199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:46.861906052 CET49778587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:47.052179098 CET58749778199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:47.706816912 CET58749779199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:47.713439941 CET49779587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:47.904191971 CET58749779199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:47.907737017 CET49779587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:48.097883940 CET58749779199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:50.194633961 CET58749780199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:50.195271015 CET49780587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:50.385718107 CET58749780199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:50.386029959 CET49780587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:50.576061964 CET58749780199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:53.301513910 CET58749781199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:53.301795006 CET49781587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:53.492562056 CET58749781199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:53.492883921 CET49781587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:53.682801008 CET58749781199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:57.209950924 CET58749782199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:57.210242033 CET49782587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:57.401289940 CET58749782199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:57.404664040 CET49782587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:57.597613096 CET58749782199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:58.314656019 CET58749784199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:58.317277908 CET49784587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:58.324326038 CET58749783199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:00:58.325126886 CET49783587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:00:58.508018017 CET58749784199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:58.508310080 CET49784587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:58.517420053 CET58749783199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:00:58.517796993 CET49783587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:00:58.698154926 CET58749784199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:00:58.708192110 CET58749783199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:01.153760910 CET58749785199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:01.154012918 CET49785587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:01.344062090 CET58749785199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:01.344387054 CET49785587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:01.534154892 CET58749785199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:01.866694927 CET58749786199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:01.867805958 CET49786587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:02.058806896 CET58749786199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:02.059304953 CET49786587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:02.250293016 CET58749786199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:03.881658077 CET58749787199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:03.881896019 CET49787587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:04.072146893 CET58749787199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:04.072447062 CET49787587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:04.262357950 CET58749787199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:05.761015892 CET58749788199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:05.761476994 CET49788587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:05.951705933 CET58749788199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:05.952223063 CET49788587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:06.142236948 CET58749788199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:06.823236942 CET58749789199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:06.823589087 CET49789587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:07.014662027 CET58749789199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:07.015180111 CET49789587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:07.205461025 CET58749789199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:09.630564928 CET58749790199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:09.631012917 CET49790587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:09.821367979 CET58749790199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:09.821949959 CET49790587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:10.012123108 CET58749790199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:12.748764992 CET58749791199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:12.749078989 CET49791587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:12.939315081 CET58749791199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:12.939600945 CET49791587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:13.129544020 CET58749791199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:14.087682009 CET58749792199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:14.088027000 CET49792587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:14.281205893 CET58749792199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:14.283047915 CET49792587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:14.474591017 CET58749792199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:15.534230947 CET58749793199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:15.534540892 CET49793587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:15.726432085 CET58749793199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:15.726715088 CET49793587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:15.916903973 CET58749793199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:17.690021038 CET58749795199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:17.690251112 CET49795587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:17.880609989 CET58749795199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:17.880868912 CET49795587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:18.072803020 CET58749795199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:18.612931967 CET58749797199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:18.613706112 CET49797587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:18.804374933 CET58749797199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:18.804801941 CET49797587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:18.999006033 CET58749797199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:21.284363985 CET58749798199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:21.284882069 CET49798587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:21.480458021 CET58749798199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:21.481062889 CET49798587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:21.532888889 CET58749799199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:21.533421040 CET49799587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:21.671130896 CET58749798199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:21.724421978 CET58749799199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:21.724963903 CET49799587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:21.915255070 CET58749799199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:25.625089884 CET58749800199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:25.625545979 CET49800587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:25.816255093 CET58749800199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:25.816869020 CET49800587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:26.007025957 CET58749800199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:27.853097916 CET58749801199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:27.853763103 CET49801587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:27.858159065 CET58749802199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:28.044333935 CET58749801199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:28.044605017 CET49801587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:28.235030890 CET58749801199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:30.335285902 CET58749803199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:30.335592031 CET49803587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:30.526629925 CET58749803199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:30.533440113 CET49803587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:30.723768950 CET58749803199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:31.604931116 CET49802587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:31.795408964 CET58749802199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:32.814342976 CET49802587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:33.004206896 CET58749802199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:34.456821918 CET58749804199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:34.457135916 CET49804587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:34.649202108 CET58749804199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:34.649521112 CET49804587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:34.840384007 CET58749804199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:38.893692970 CET58749805199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:38.894042969 CET49805587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:39.085583925 CET58749805199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:39.085908890 CET49805587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:39.276056051 CET58749805199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:41.736498117 CET58749806199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:41.737001896 CET49806587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:41.927407980 CET58749806199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:41.927922010 CET49806587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:42.118094921 CET58749806199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:43.635668993 CET58749807199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:43.638381004 CET49807587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:43.750307083 CET58749808199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:43.751010895 CET49808587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:43.829294920 CET58749807199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:43.829917908 CET49807587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:43.941509962 CET58749808199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:43.941972017 CET49808587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:44.019892931 CET58749807199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:44.132210970 CET58749808199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:48.039824009 CET58749809199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:48.040148973 CET49809587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:48.230098009 CET58749809199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:48.230492115 CET49809587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:48.420342922 CET58749809199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:50.000015974 CET58749810199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:50.000456095 CET49810587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:50.191111088 CET58749810199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:50.192306042 CET49810587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:50.382050991 CET58749810199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:50.885778904 CET58749811199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:50.886068106 CET49811587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:51.076761007 CET58749811199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:51.077038050 CET49811587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:51.267127037 CET58749811199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:51.693038940 CET58749812199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:51.693440914 CET49812587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:51.883703947 CET58749812199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:51.883953094 CET49812587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:52.073928118 CET58749812199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:53.076587915 CET58749813199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:53.077069998 CET49813587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:53.270800114 CET58749813199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:53.271234989 CET49813587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:53.461445093 CET58749813199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:55.668385029 CET58749814199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:55.668708086 CET49814587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:55.859302044 CET58749814199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:55.861972094 CET49814587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:56.052262068 CET58749814199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:01:57.486742973 CET58749815199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:01:57.488416910 CET49815587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:01:57.678283930 CET58749815199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:01:57.679305077 CET49815587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:01:57.868951082 CET58749815199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:02.119780064 CET58749816199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:02.120094061 CET49816587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:02.310462952 CET58749816199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:02.311018944 CET49816587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:02.501113892 CET58749816199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:04.162039042 CET58749817199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:04.163682938 CET49817587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:04.353744030 CET58749817199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:04.354710102 CET49817587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:04.544641972 CET58749817199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:06.739955902 CET58749818199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:06.741179943 CET49818587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:06.931835890 CET58749818199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:06.932323933 CET49818587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:07.122363091 CET58749818199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:09.375710011 CET58749823199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:09.376919985 CET49823587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:09.568360090 CET58749823199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:09.572520018 CET49823587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:09.762430906 CET58749823199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:11.413281918 CET58749827199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:11.413774014 CET49827587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:11.604326963 CET58749827199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:11.605890036 CET49827587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:11.795685053 CET58749827199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:14.680536032 CET58749831199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:14.682537079 CET49831587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:14.873294115 CET58749831199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:14.905807018 CET49831587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:15.096021891 CET58749831199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:17.745964050 CET58749832199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:17.746226072 CET49832587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:17.936898947 CET58749832199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:17.937329054 CET49832587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:18.127619982 CET58749832199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:23.349724054 CET58749833199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:23.352009058 CET49833587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:23.542123079 CET58749833199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:23.543831110 CET49833587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:23.733742952 CET58749833199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:23.791246891 CET58749834199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:23.791553974 CET49834587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:23.981687069 CET58749834199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:23.981918097 CET49834587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:24.171911001 CET58749834199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:25.909921885 CET58749835199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:25.910132885 CET49835587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:26.100660086 CET58749835199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:26.100920916 CET49835587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:26.291158915 CET58749835199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:27.035151958 CET58749836199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:27.035372972 CET49836587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:27.228023052 CET58749836199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:27.228200912 CET49836587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:27.418167114 CET58749836199.193.7.228192.168.2.3220 Ready to start TLS
                                                                      Jan 14, 2021 08:02:28.561914921 CET58749837199.193.7.228192.168.2.3220 PrivateEmail.com prod Mail Node
                                                                      Jan 14, 2021 08:02:28.564661980 CET49837587192.168.2.3199.193.7.228EHLO 181598
                                                                      Jan 14, 2021 08:02:28.756741047 CET58749837199.193.7.228192.168.2.3250-mta-12.privateemail.com
                                                                      250-PIPELINING
                                                                      250-SIZE 81788928
                                                                      250-ETRN
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 STARTTLS
                                                                      Jan 14, 2021 08:02:28.757129908 CET49837587192.168.2.3199.193.7.228STARTTLS
                                                                      Jan 14, 2021 08:02:28.947220087 CET58749837199.193.7.228192.168.2.3220 Ready to start TLS

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:08:00:10
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe'
                                                                      Imagebase:0xfe0000
                                                                      File size:1891328 bytes
                                                                      MD5 hash:80D255A6A5EC339E15D6FEC3C0FEF666
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.280603529.000000000369E000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000000.00000002.293576161.0000000004C48000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:35
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TcVfsyyjYuQ' /XML 'C:\Users\user\AppData\Local\Temp\tmpDAC4.tmp'
                                                                      Imagebase:0x1380000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:00:36
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6b2800000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:00:36
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:{path}
                                                                      Imagebase:0x510000
                                                                      File size:1891328 bytes
                                                                      MD5 hash:80D255A6A5EC339E15D6FEC3C0FEF666
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:37
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\Desktop\B6LNCKjOGt5EmFQ.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:{path}
                                                                      Imagebase:0x7ff7ca4e0000
                                                                      File size:1891328 bytes
                                                                      MD5 hash:80D255A6A5EC339E15D6FEC3C0FEF666
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Visual Basic
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.291239624.0000000004451000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.283351079.000000000134C000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000008.00000003.281411863.0000000004450000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.289168879.0000000003E3C000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.287788541.00000000044BD000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.278201176.000000000138F000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.285048922.0000000004451000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000008.00000003.277852049.0000000003760000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.278060140.0000000001324000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.287852153.0000000003DD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.286730546.00000000044BD000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000008.00000002.298778649.0000000000403000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:39
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe' 0
                                                                      Imagebase:0xdb0000
                                                                      File size:456192 bytes
                                                                      MD5 hash:D9001138C5119D936B70BF77E136AFBE
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.611843586.00000000032C9000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000009.00000002.604546258.0000000000DB2000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000009.00000000.281199501.0000000000DB2000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: C:\Users\user\AppData\Local\Temp\LOGO AND PICTURES.exe, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:40
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\AppData\Local\Temp\Pictures.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Local\Temp\Pictures.exe' 0
                                                                      Imagebase:0x150000
                                                                      File size:533504 bytes
                                                                      MD5 hash:25146E9C5ECD498DD17BA01E6CFAEB24
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000A.00000002.329671193.0000000003921000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000A.00000002.329671193.0000000003921000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 0000000A.00000002.323788934.0000000000152000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 0000000A.00000000.282912644.0000000000152000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 0000000A.00000002.327595878.000000000295F000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Joe Security
                                                                      • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Joe Security
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: Joe Security
                                                                      • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Local\Temp\Pictures.exe, Author: JPCERT/CC Incident Response Group
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:41
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\AppData\Local\Temp\PO456724392021.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Local\Temp\PO456724392021.exe' 0
                                                                      Imagebase:0xab0000
                                                                      File size:221696 bytes
                                                                      MD5 hash:F38E2D474C075EFF35B4EF81FDACA650
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.284660390.0000000000AB2000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.612763581.0000000002D81000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.612763581.0000000002D81000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.604664953.0000000000AB2000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.612958072.0000000002DD2000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.612958072.0000000002DD2000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\PO456724392021.exe, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:42
                                                                      Start date:14/01/2021
                                                                      Path:C:\Users\user\AppData\Local\Temp\PO2345714382021.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\AppData\Local\Temp\PO2345714382021.exe' 0
                                                                      Imagebase:0x5d0000
                                                                      File size:220672 bytes
                                                                      MD5 hash:9B79DE8E3AD21F14E71E55CFA6AE4727
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.287649744.00000000005D2000.00000002.00020000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\PO2345714382021.exe, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:00:45
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:dw20.exe -x -s 2184
                                                                      Imagebase:0x10000000
                                                                      File size:33936 bytes
                                                                      MD5 hash:8D10DA8A3E11747E51F23C882C22BBC3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:00:48
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                                      Imagebase:0x400000
                                                                      File size:1171592 bytes
                                                                      MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000013.00000002.301913637.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:00:48
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                                      Imagebase:0x400000
                                                                      File size:1171592 bytes
                                                                      MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000014.00000002.308380033.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:01:13
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\SysWOW64\netsh.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'netsh' wlan show profile
                                                                      Imagebase:0xcb0000
                                                                      File size:82944 bytes
                                                                      MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:01:14
                                                                      Start date:14/01/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6b2800000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >