Loading ...

Play interactive tourEdit tour

Windows Analysis Report 60L3nw00Uk

Overview

General Information

Sample Name:60L3nw00Uk (renamed file extension from none to exe)
Analysis ID:474426
MD5:1e6ec142ba08c7deafd25bdea76f32d4
SHA1:6b52334ca53b1c604c5865e2ab49056b870808c5
SHA256:e773f60aeb241f884b4f932d7ddd4e31c87f31781d5bd53d8583b3d54807a449
Tags:exeHawkEye
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MailPassView
Multi AV Scanner detection for submitted file
Yara detected HawkEye Keylogger
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Detected HawkEye Rat
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Writes to foreign memory regions
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Mail credentials (via file registry)
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected WebBrowserPassView password recovery tool
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to steal Instant Messenger accounts or passwords
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Enables debug privileges
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • 60L3nw00Uk.exe (PID: 312 cmdline: 'C:\Users\user\Desktop\60L3nw00Uk.exe' MD5: 1E6EC142BA08C7DEAFD25BDEA76F32D4)
    • schtasks.exe (PID: 6832 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UaoePQDdm' /XML 'C:\Users\user\AppData\Local\Temp\tmp16F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 60L3nw00Uk.exe (PID: 6848 cmdline: C:\Users\user\Desktop\60L3nw00Uk.exe MD5: 1E6EC142BA08C7DEAFD25BDEA76F32D4)
      • vbc.exe (PID: 7024 cmdline: 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9B04.tmp' MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • vbc.exe (PID: 5260 cmdline: 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9795.tmp' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmpMAL_HawkEye_Keylogger_Gen_Dec18Detects HawkEye Keylogger RebornFlorian Roth
  • 0x15d586:$s1: HawkEye Keylogger
  • 0x15d5ef:$s1: HawkEye Keylogger
  • 0x1569c9:$s2: _ScreenshotLogger
  • 0x156996:$s3: _PasswordStealer
00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
    00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmpAPT_NK_BabyShark_KimJoingRAT_Apr19_1Detects BabyShark KimJongRATFlorian Roth
    • 0x147b0:$a1: logins.json
    • 0x14710:$s3: SELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_login
    • 0x14f34:$s4: \mozsqlite3.dll
    • 0x137a4:$s5: SMTP Password
    00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
      00000006.00000002.605633875.0000000002E0F000.00000004.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
        Click to see the 21 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        6.3.60L3nw00Uk.exe.4565bd5.0.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
          6.3.60L3nw00Uk.exe.45bdbda.1.unpackAPT_NK_BabyShark_KimJoingRAT_Apr19_1Detects BabyShark KimJongRATFlorian Roth
          • 0x11bb0:$a1: logins.json
          • 0x11b10:$s3: SELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_login
          • 0x12334:$s4: \mozsqlite3.dll
          • 0x115a4:$s5: SMTP Password
          6.3.60L3nw00Uk.exe.45bdbda.1.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            2.2.60L3nw00Uk.exe.3a5c958.1.unpackMAL_HawkEye_Keylogger_Gen_Dec18Detects HawkEye Keylogger RebornFlorian Roth
            • 0x85e2e:$s1: HawkEye Keylogger
            • 0x85e97:$s1: HawkEye Keylogger
            • 0x7f271:$s2: _ScreenshotLogger
            • 0x7f23e:$s3: _PasswordStealer
            2.2.60L3nw00Uk.exe.3a5c958.1.unpackSUSP_NET_NAME_ConfuserExDetects ConfuserEx packed fileArnim Rupp
            • 0x85801:$name: ConfuserEx
            • 0x8450e:$compile: AssemblyTitle
            Click to see the 39 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: 60L3nw00Uk.exeMetadefender: Detection: 20%Perma Link
            Source: 60L3nw00Uk.exeReversingLabs: Detection: 65%
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\UaoePQDdm.exeMetadefender: Detection: 20%Perma Link
            Source: C:\Users\user\AppData\Roaming\UaoePQDdm.exeReversingLabs: Detection: 65%
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 60L3nw00Uk.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 60L3nw00Uk.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exe
            Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: 60L3nw00Uk.exe, 00000006.00000002.605633875.0000000002E0F000.00000004.00000001.sdmp, vbc.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040938F FindFirstFileW,FindNextFileW,wcslen,wcslen,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408CAC FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_0040702D FindFirstFileA,FindNextFileA,strlen,strlen,
            Source: vbc.exe, 00000007.00000002.393778049.0000000000970000.00000004.00000001.sdmpString found in binary or memory: ?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=ab104b93-3a7d-4cc3-b5fe-9fa9f0462c64&partnerId=retailstore2https://login.live.com/me.srfhttp://cookies.onetrust.mgr.consensu.org/?name=euconsent&value=&expire=0&isFirstRequest=truehttp://cookies.onetrust.mgr.consensu.org/https://www.microsoft.com/en-us/welcomeie11/welcomeie11https://www.microsoft.com/store/buy/cartcounthttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/logins+Q equals www.facebook.com (Facebook)
            Source: vbc.exe, 00000007.00000002.393778049.0000000000970000.00000004.00000001.sdmpString found in binary or memory: ?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=ab104b93-3a7d-4cc3-b5fe-9fa9f0462c64&partnerId=retailstore2https://login.live.com/me.srfhttp://cookies.onetrust.mgr.consensu.org/?name=euconsent&value=&expire=0&isFirstRequest=truehttp://cookies.onetrust.mgr.consensu.org/https://www.microsoft.com/en-us/welcomeie11/welcomeie11https://www.microsoft.com/store/buy/cartcounthttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/logins+Q equals www.yahoo.com (Yahoo)
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.393358492.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.393358492.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000007.00000003.392724368.000000000096E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000007.00000003.392724368.000000000096E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpString found in binary or memory: http://bot.whatismyipaddress.com/
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertECCSecureServerCA.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2ExtendedValidationServerCA.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSecureSiteECCCA-1.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cookies.onetrust.mgr.consensu.org/?name=euconsent&value=&expire=0&isFirstRequest=true
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://cookies.onetrust.mgr.consensu.org/onetrust-logo.svg
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl.pki.goog/GTSGIAG3.crl0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertSecureSiteECCCA-1.crl0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/sha2-ev-server-g2.crl04
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-server-g6.crl04
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/ssca-ecc-g1.crl0.
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g6.crl0/
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertSecureSiteECCCA-1.crl0L
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/sha2-ev-server-g2.crl0K
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-server-g6.crl0L
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/ssca-ecc-g1.crl0L
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g6.crl0L
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://google.com/chrome
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://images.outbrainimg.com/transform/v3/eyJpdSI6IiIsIml1ZSI6Imh0dHA6Ly9pbWFnZXMyLnplbWFudGEuY29tL
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://images.outbrainimg.com/transform/v3/eyJpdSI6IjIwZTg0ZTY4NTUwZTU4OGJhMzFmNmI5YjE4N2E4NDAyZWVmO
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://images.outbrainimg.com/transform/v3/eyJpdSI6IjJhM2VjZmJmYzJjMzAzZjVjMGM1MjhiNDZjYWEyNDY0MGI2M
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ1Y2M3ZjUxNTk0ZjI1ZWI5NjQxNjllMjcxMDliYzA5MWY4N
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA61Ofl?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA7XCQ3?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AABzUSt?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADsAOZ?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADsZuW?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADuTp7?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADuZko?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADv4Ge?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADv842?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADv9IZ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvbPR?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvbce?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvhNP?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvhax?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvqEs?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvuGs?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AADvzqT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyuliQ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzjSw3?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB16g6qc?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17milU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB18T33l?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19xDME?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19xGDT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19xMWp?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19xaUu?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19xssM?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19xzm6?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19yF6n?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19yFoT?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19yG8H?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19yKf2?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19ylKx?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19yuvA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB19yxVU?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1kc8s?m=6&o=true&u=true&n=true&w=30&h=30
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB6Ma4a?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7hjL?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBMQmHU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBMVUFn?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBO5Geh?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBRUB0d?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBS0Ogx?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBVuaWG?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBVuddh?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBWoHwx?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBX2afX?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnYSFZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BByBEMv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0:
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0B
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0E
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0F
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0K
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0M
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0R
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.msocsp.com0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.pki.goog/GTSGIAG30
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.pki.goog/gsr202
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0#
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0M
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://pki.goog/gsr2/GTSGIAG3.crt0)
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpString found in binary or memory: http://pomf.cat/upload.php
            Source: 60L3nw00Uk.exe, 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, 60L3nw00Uk.exe, 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://pomf.cat/upload.php&https://a.pomf.cat/
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpString found in binary or memory: http://pomf.cat/upload.phpCContent-Disposition:
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/2366737e/webcore/externalscripts/oneTrust/ski
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/5445db85/webcore/externalscripts/oneTrust/de-
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/css/3bf20fde-50425371/directi
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/css/f60532dd-3aac3bb8/directi
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/3bf20fde-2923b6c2/directio
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/3bf20fde-b532f4eb/directio
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-2923b6c2/directio
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-f8dd99d9/directio
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/81/58b810.gif
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/86/2042ed.woff
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA61Ofl.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA7XCQ3.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AABzUSt.img?h=368&w=622
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADsAOZ.img?h=333&w=311
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADsZuW.img?h=166&w=310
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADuTp7.img?h=333&w=311
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADuZko.img?h=75&w=100&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADv4Ge.img?h=75&w=100&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADv842.img?h=250&w=300
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADv9IZ.img?h=75&w=100&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvbPR.img?h=250&w=300
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvbce.img?h=166&w=310
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvhNP.img?h=166&w=310
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvhax.img?h=166&w=310
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvqEs.img?h=166&w=310
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvuGs.img?h=333&w=311
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AADvzqT.img?h=166&w=310
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyuliQ.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzjSw3.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB16g6qc.img?h=27&w=27&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17milU.img?h=16&w=16&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB18T33l.img?h=333&w=31
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19xDME.img?h=75&w=100
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19xGDT.img?h=166&w=31
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19xMWp.img?h=75&w=100
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19xaUu.img?h=166&w=31
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19xssM.img?h=75&w=100
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19xzm6.img?h=250&w=30
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19yF6n.img?h=333&w=31
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19yFoT.img?h=75&w=100
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19yG8H.img?h=166&w=31
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19yKf2.img?h=75&w=100
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19ylKx.img?h=75&w=100
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19yuvA.img?h=250&w=30
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB19yxVU.img?h=166&w=31
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1kc8s.img?m=6&o=true&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB6Ma4a.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7hjL.img?h=16&w=16&m=
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBMQmHU.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBMVUFn.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBO5Geh.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBRUB0d.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBS0Ogx.img?h=75&w=100&
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBVuaWG.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBVuddh.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBWoHwx.img?h=27&w=27&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&w=27&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBkwUr.img?h=16&w=16&m=
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnYSFZ.img?h=16&w=16&m
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BByBEMv.img?h=16&w=16&m
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: 60L3nw00Uk.exe, 00000002.00000002.379949260.0000000000E87000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: 60L3nw00Uk.exe, 00000002.00000002.379949260.0000000000E87000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.com-
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: 60L3nw00Uk.exe, 00000002.00000002.379949260.0000000000E87000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comuevaq
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://www.msn.com
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://www.msn.com/
            Source: vbc.exe, 00000007.00000003.390702879.0000000000954000.00000004.00000001.sdmp, bhv34B0.tmp.7.drString found in binary or memory: http://www.msn.com/?ocid=iehp
            Source: vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.co
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://www.msn.com/de-ch/?ocid=iehp
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/consent/55a804
            Source: bhv34B0.tmp.7.drString found in binary or memory: http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplate
            Source: vbc.exe, 00000007.00000002.393310121.000000000019C000.00000004.00000001.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: vbc.exe, vbc.exe, 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: 60L3nw00Uk.exe, 00000002.00000003.344397438.0000000000E8C000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comn-u
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: 60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;g
            Source: vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.393778049.0000000000970000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, bhv34B0.tmp.7.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpString found in binary or memory: https://a.pomf.cat/
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gt
            Source: vbc.exe, 00000007.00000003.390702879.0000000000954000.00000004.00000001.sdmp, bhv34B0.tmp.7.drString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://amp.azure.net/libs/amp/1.8.0/azuremediaplayer.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://arc.msn.com/v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=314559&adm=
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC54c8a2b02c3446f48a60b41e8a5ff47
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC828bc1cde9f04b788c98b5423157734
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC9b2d2bc73c8a4a1d8dd5c3d69b6634a
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc13122162a9a46c3b4cbf05ffccde0f
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc71c68d7b8f049b6a6f3b669bd5d00c
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCee0d4d5fd4424c8390d703b105f82c3
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://az416426.vo.msecnd.net/scripts/a/ai.0.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://az725175.vo.msecnd.net/scripts/jsll-4.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/48/nrrV18753.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/__media__/js/util/nrrV9140.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
            Source: vbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390323605.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
            Source: vbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390323605.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://cvision.media.net/new/286x175/2/189/134/171/257b11a9-f3a3-4bb3-9298-c791f456f3d0.jpg?v=9
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://cvision.media.net/new/286x175/3/248/152/169/520bb037-5f8d-42d6-934b-d6ec4a6832e8.jpg?v=9
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://cvision.media.net/new/300x300/2/189/9/46/83cfba42-7d45-4670-a4a7-a3211ca07534.jpg?v=9
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://cvision.media.net/new/300x300/3/237/70/222/47ef75a1-aa03-4dce-a349-91d6a5ed47bb.jpg?v=9
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B9B620FEE
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://fonts.googleapis.com/css?family=Google
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://fonts.gstatic.com/s/googlesans/v16/4UaGrENHsxJlGDuGo1OIlI3K.woff
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://fonts.gstatic.com/s/googlesans/v16/4UabrENHsxJlGDuGo1OIlLU94bt3.woff
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmEU9vAA.woff
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Me5g.woff
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DnuZ
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Dnv6
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Dnwt
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DsDH
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4FBmQ
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4FBmV
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4FBmZ
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4FGwC
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4n1yl
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4n4cm
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJ7
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJa
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4nqTh
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4sQww?ver=37ff
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tD2S
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tG3O
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tIoW
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tIoY
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tKUA
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tMOD
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tMOM
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4tQVa
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4u1kF
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ubMD
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4wqj5
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4zuiC
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWeTGO?ver=8c74&q=90&m=
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_fill%
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: vbc.exe, 00000007.00000003.390702879.0000000000954000.00000004.00000001.sdmp, bhv34B0.tmp.7.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://logincdn.msauth.net/16.000.28230.00/MeControl.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meBoot.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://mwf-service.akamaized.net/mwf/css/bundle/1.57.0/west-european/default/mwf-main.min.css
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://mwf-service.akamaized.net/mwf/js/bundle/1.57.0/mwf-auto-init-main.var.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://optanon.blob.core.windows.net/skins/4.1.0/default_flat_top_two_button_black/v2/css/optanon.c
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://optanon.blob.core.windows.net/skins/4.1.0/default_flat_top_two_button_black/v2/images/cookie
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://pki.goog/repository/0
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://prod-video-cms-rt-microsoft-com.akamaized.net/vhs/api/videos/RE4sQBc
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=fa1a6a09db4c4f6fbf480b78c51caf60&c=MSN&d=http%3A%2F%2Fwww.msn
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://statics-marketingsites-neu-ms-com.akamaized.net/statics/override.css?c=7
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google-analytics.com/gtm/js?id=GTM-N7S69J3&cid=1824632442.1601478955
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/
            Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/application/x-msdownloadC:
            Source: vbc.exe, 00000007.00000003.392724368.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390323605.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/css/main.v2.min.css
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/css/main.v3.min.css
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/app-store-download.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/chrome-logo.svg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/chrome_safari-behavior.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/chrome_throbber_fast.gif
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/cursor-replay.cur
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/google-chrome-logo.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/icon-description-white-blue-bg.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/icon-file-download.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/icon-help.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/icon-twitter.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/folder-applications.svg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/google-play-download.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/google-beta.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/google-canary.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/google-dev.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/google-enterprise.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/hero-anim-bottom-left.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/hero-anim-middle.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/homepage_features.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/homepage_privacy.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/homepage_tools.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/homepage/laptop_desktop.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/icon-announcement.svg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/icon-file-download.svg
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/mac-ico.png
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/images/thank-you/thankyou-animation.json
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/js/installer.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/static/js/main.v2.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
            Source: vbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.googleadservices.com/pagead/conversion.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.googleadservices.com/pagead/conversion_async.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.googleadservices.com/pagead/p3p.xml
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-26908291-4
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=GTM-PZ6TRJB
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.gstatic.com/external_hosted/autotrack/autotrack.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.gstatic.com/external_hosted/lottie/lottie.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.gstatic.com/external_hosted/modernizr/modernizr.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.gstatic.com/external_hosted/scrollmagic/ScrollMagic.min.js
            Source: bhv34B0.tmp.7.drString found in binary or memory: https://www.gstatic.com/external_hosted/scrollmagic/animation.gsap.min.js

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 312, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040F078 OpenClipboard,GetLastError,DeleteFileW,

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 6.3.60L3nw00Uk.exe.45bdbda.1.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 6.2.60L3nw00Uk.exe.3d91990.2.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 22.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 6.2.60L3nw00Uk.exe.3d91990.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 22.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 6.3.60L3nw00Uk.exe.45bdbda.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 6.3.60L3nw00Uk.exe.4565890.2.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 6.3.60L3nw00Uk.exe.4565890.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 6.3.60L3nw00Uk.exe.4565bd5.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 6.2.60L3nw00Uk.exe.3cf5950.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: 60L3nw00Uk.exe PID: 312, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 60L3nw00Uk.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 6.3.60L3nw00Uk.exe.45bdbda.1.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 6.2.60L3nw00Uk.exe.3d91990.2.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 22.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 6.2.60L3nw00Uk.exe.3d91990.2.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 22.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 6.3.60L3nw00Uk.exe.45bdbda.1.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 6.3.60L3nw00Uk.exe.4565890.2.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 6.3.60L3nw00Uk.exe.4565890.2.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 6.3.60L3nw00Uk.exe.4565bd5.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 6.2.60L3nw00Uk.exe.3cf5950.3.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: 60L3nw00Uk.exe PID: 312, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00422893
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00E5C5F4
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00E5EA40
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00E5EA50
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_008B2893
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01032068
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010350B0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010304D8
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01039900
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010338E6
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01030C48
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01039F6B
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01036FE7
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01034168
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01034178
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010371F0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01034519
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01030527
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01034528
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01030562
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033568
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010305A6
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010305ED
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033981
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010339D7
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010329E9
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010329F8
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01037838
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01037848
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01035868
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01035878
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010348D0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010348E0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010398FB
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033B1E
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033B60
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033BCE
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033BF1
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033A02
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033A77
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033AAA
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033ADD
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033D40
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033DA0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033DDD
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033C1D
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01030C35
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033C73
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01031F6E
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01031F89
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01038E16
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033E1A
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01033E75
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B914DD
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B91415
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B90778
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B90EA8
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B91295
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B91134
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B91174
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B9170B
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B912D5
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B91667
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B9125A
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA4310
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA4C00
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BAFBC0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA9090
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA908B
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BAC2B8
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BAC2C8
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA3FC0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA8B70
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05BA8B6B
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0044900F
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004042EB
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00414281
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00410291
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004063BB
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415624
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0041668D
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040477F
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040487C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0043589B
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0043BA9D
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0043FBD3
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00404DE5
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00404E56
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00404EC7
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00404F58
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_0040BF6B
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00415F19 appears 34 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 0044468C appears 36 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004162C2 appears 87 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00412084 appears 39 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00444B90 appears 36 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 0041607A appears 66 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004083D6 appears 32 times
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_05B91398 NtUnmapViewOfSection,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040978A memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,
            Source: 60L3nw00Uk.exe, 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameReborn Stub.exe" vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exe, 00000002.00000003.374214546.000000000E0E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameIPathLo.exe( vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exe, 00000002.00000002.383526468.0000000003D5A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.603661949.00000000009C4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIPathLo.exe( vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameReborn Stub.exe" vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604399351.000000000108A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exeBinary or memory string: OriginalFilenameIPathLo.exe( vs 60L3nw00Uk.exe
            Source: 60L3nw00Uk.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: UaoePQDdm.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: 60L3nw00Uk.exeMetadefender: Detection: 20%
            Source: 60L3nw00Uk.exeReversingLabs: Detection: 65%
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeFile read: C:\Users\user\Desktop\60L3nw00Uk.exeJump to behavior
            Source: 60L3nw00Uk.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\60L3nw00Uk.exe 'C:\Users\user\Desktop\60L3nw00Uk.exe'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UaoePQDdm' /XML 'C:\Users\user\AppData\Local\Temp\tmp16F.tmp'
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Users\user\Desktop\60L3nw00Uk.exe C:\Users\user\Desktop\60L3nw00Uk.exe
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9B04.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9795.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UaoePQDdm' /XML 'C:\Users\user\AppData\Local\Temp\tmp16F.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Users\user\Desktop\60L3nw00Uk.exe C:\Users\user\Desktop\60L3nw00Uk.exe
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9B04.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9795.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeFile created: C:\Users\user\AppData\Roaming\UaoePQDdm.exeJump to behavior
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeFile created: C:\Users\user\AppData\Local\Temp\tmp16F.tmpJump to behavior
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@10/7@0/0
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00418073 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.393358492.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u200d????????????????????????????????????????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u200d????????????????????????????????????????.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u202a????????????????????????????????????????.csSecurity API names: System.Void Microsoft.Win32.RegistryKey::SetAccessControl(System.Security.AccessControl.RegistrySecurity)
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u202a????????????????????????????????????????.csSecurity API names: System.Security.Principal.IdentityReference System.Security.Principal.SecurityIdentifier::Translate(System.Type)
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u202a????????????????????????????????????????.csSecurity API names: System.Void System.Security.AccessControl.RegistrySecurity::AddAccessRule(System.Security.AccessControl.RegistryAccessRule)
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u200b????????????????????????????????????????.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00417BE9 GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00413424 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6880:120:WilError_01
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMutant created: \Sessions\1\BaseNamedObjects\tkAxgENGU
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMutant created: \Sessions\1\BaseNamedObjects\0afb590f-6441-4e30-9017-486274a19cc9
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004141E0 FindResourceW,SizeofResource,LoadResource,LockResource,
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u206b????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u202d????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u202d????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u202d????????????????????????????????????????.csCryptographic APIs: 'CreateDecryptor'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: 60L3nw00Uk.exeStatic file information: File size 1222144 > 1048576
            Source: 60L3nw00Uk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: 60L3nw00Uk.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: 60L3nw00Uk.exe, 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, vbc.exe
            Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: 60L3nw00Uk.exe, 00000006.00000002.605633875.0000000002E0F000.00000004.00000001.sdmp, vbc.exe

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: 60L3nw00Uk.exe, u0008u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: UaoePQDdm.exe.2.dr, u0008u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 2.2.60L3nw00Uk.exe.420000.0.unpack, u0008u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 2.0.60L3nw00Uk.exe.420000.0.unpack, u0008u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 6.0.60L3nw00Uk.exe.8b0000.0.unpack, u0008u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 6.2.60L3nw00Uk.exe.8b0000.1.unpack, u0008u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00426EC5 push cs; ret
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00426D57 pushad ; retf
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_004271DB push cs; ret
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 2_2_00426B92 push cs; ret
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_008B6B92 push cs; ret
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_008B6EC5 push cs; ret
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_008B71DB push cs; ret
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_008B6D57 pushad ; retf
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_0103326C push ss; retf
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_010332F5 push ss; retf
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeCode function: 6_2_01038C09 push es; retn 0002h
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00444975 push ecx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00444B90 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00444B90 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00448E74 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0042CF44 push ebx; retf 0042h
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00412341 push ecx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00412360 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_00412360 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004443B0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: initial sampleStatic PE information: section name: .text entropy: 7.98495143764
            Source: initial sampleStatic PE information: section name: .text entropy: 7.98495143764
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeFile created: C:\Users\user\AppData\Roaming\UaoePQDdm.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UaoePQDdm' /XML 'C:\Users\user\AppData\Local\Temp\tmp16F.tmp'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00443A61 memset,wcscpy,memset,wcscpy,wcscat,wcscpy,wcscat,wcscpy,wcscat,GetModuleHandleW,LoadLibraryExW,LoadLibraryW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 312, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmp, 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT MacAddress FROM Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\60L3nw00Uk.exe TID: 5716Thread sleep time: -40215s >= -30000s
            Source: C:\Users\user\Desktop\60L3nw00Uk.exe TID: 2680Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\60L3nw00Uk.exe TID: 2040Thread sleep count: 133 > 30
            Source: C:\Users\user\Desktop\60L3nw00Uk.exe TID: 2040Thread sleep time: -133000s >= -30000s
            Source: C:\Users\user\Desktop\60L3nw00Uk.exe TID: 6864Thread sleep count: 132 > 30
            Source: C:\Users\user\Desktop\60L3nw00Uk.exe TID: 6864Thread sleep time: -132000s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040978A memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess information queried: ProcessInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0041829C memset,GetSystemInfo,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040938F FindFirstFileW,FindNextFileW,wcslen,wcslen,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408CAC FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_0040702D FindFirstFileA,FindNextFileA,strlen,strlen,
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeThread delayed: delay time: 40215
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeThread delayed: delay time: 922337203685477
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: bhv34B0.tmp.7.drBinary or memory string: https://arc.msn.com/v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=314559&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:BE8AB8DF-DCD1-3523-4A95-3A04EAFF1CBA&ctry=US&time=20210831T064904Z&lc=en-US&pl=en-US&idtp=mid&uid=b029da70-c67b-4a7e-9bd5-517f7e302ed9&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=f7acc45fb2b24400a598a1f7cd5ed342&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1145456&metered=false&nettype=ethernet&npid=sc-314559&oemName=VMware%2C%20Inc.&oemid=VMware%2C%20Inc.&ossku=Professional&smBiosDm=VMware7%2C1&tl=2&tsu=1145456&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing=
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: 60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040978A memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004443B0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 445000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 451000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 454000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 23C008
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 413000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 417000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 419000
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 247008
            .NET source code references suspicious native API functionsShow sources
            Source: 6.2.60L3nw00Uk.exe.400000.0.unpack, u200d????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'FindResource@kernel32.dll'), ('?????????????????????????????????????????', 'capGetDriverDescriptionA@avicap32.dll'), ('?????????????????????????????????????????', 'WriteProcessMemory@kernel32.dll'), ('????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'VirtualAllocEx@kernel32.dll'), ('?????????????????????????????????????????', 'ReadProcessMemory@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
            Allocates memory in foreign processesShow sources
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Users\user\Desktop\60L3nw00Uk.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UaoePQDdm' /XML 'C:\Users\user\AppData\Local\Temp\tmp16F.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Users\user\Desktop\60L3nw00Uk.exe C:\Users\user\Desktop\60L3nw00Uk.exe
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9B04.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9795.tmp'
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Users\user\Desktop\60L3nw00Uk.exe VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Users\user\Desktop\60L3nw00Uk.exe VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\60L3nw00Uk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00418137 GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004083A1 GetVersionExW,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 22_2_004073B6 memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: bdagent.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: MSASCui.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avguard.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avgrsx.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avcenter.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avp.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: zlclient.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: wireshark.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avgcsrvx.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avgnt.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: hijackthis.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avgui.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: avgwdsvc.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: mbam.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: MsMpEng.exe
            Source: 60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpBinary or memory string: ComboFix.exe

            Stealing of Sensitive Information:

            barindex
            Yara detected MailPassViewShow sources
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.45bdbda.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.3d91990.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 22.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.3d91990.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 22.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.45bdbda.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565890.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565890.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565bd5.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.3cf5950.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.605633875.0000000002E0F000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.606069494.0000000003CF5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTR
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 312, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTR
            Tries to steal Mail credentials (via file registry)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
            Yara detected WebBrowserPassView password recovery toolShow sources
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565bd5.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.3cf5950.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565890.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565890.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.3.60L3nw00Uk.exe.4565bd5.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.3cf5950.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.393358492.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.606069494.0000000003CF5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTR
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
            Tries to steal Instant Messenger accounts or passwordsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.3a5c958.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.60L3nw00Uk.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.3a5c958.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.60L3nw00Uk.exe.39871a0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 312, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 60L3nw00Uk.exe PID: 6848, type: MEMORYSTR
            Detected HawkEye RatShow sources
            Source: 60L3nw00Uk.exe, 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: 60L3nw00Uk.exe, 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation111Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API11Scheduled Task/Job1Process Injection411Deobfuscate/Decode Files or Information11Credentials in Registry2Account Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsShared Modules1Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information3Credentials In Files1File and Directory Discovery2SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsScheduled Task/Job1Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSystem Information Discovery19Distributed Component Object ModelClipboard Data1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery331SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection411DCSyncProcess Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 474426 Sample: 60L3nw00Uk Startdate: 30/08/2021 Architecture: WINDOWS Score: 100 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for dropped file 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 8 other signatures 2->43 7 60L3nw00Uk.exe 7 2->7         started        process3 file4 23 C:\Users\user\AppData\Roaming\UaoePQDdm.exe, PE32 7->23 dropped 25 C:\Users\user\AppData\Local\Temp\tmp16F.tmp, XML 7->25 dropped 27 C:\Users\user\AppData\...\60L3nw00Uk.exe.log, ASCII 7->27 dropped 45 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->45 47 Uses schtasks.exe or at.exe to add and modify task schedules 7->47 49 Injects a PE file into a foreign processes 7->49 11 60L3nw00Uk.exe 5 7->11         started        14 schtasks.exe 1 7->14         started        signatures5 process6 signatures7 51 Writes to foreign memory regions 11->51 53 Allocates memory in foreign processes 11->53 55 Sample uses process hollowing technique 11->55 57 Injects a PE file into a foreign processes 11->57 16 vbc.exe 1 11->16         started        19 vbc.exe 11->19         started        21 conhost.exe 14->21         started        process8 signatures9 29 Tries to steal Mail credentials (via file registry) 16->29 31 Tries to harvest and steal browser information (history, passwords, etc) 16->31 33 Tries to steal Instant Messenger accounts or passwords 19->33 35 Tries to steal Mail credentials (via file access) 19->35

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            60L3nw00Uk.exe26%MetadefenderBrowse
            60L3nw00Uk.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\UaoePQDdm.exe26%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\UaoePQDdm.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            6.2.60L3nw00Uk.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
            7.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
            https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z0%Avira URL Cloudsafe
            https://a.pomf.cat/0%Avira URL Cloudsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
            http://www.fontbureau.com-0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.fontbureau.comuevaq0%Avira URL Cloudsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_fill%0%URL Reputationsafe
            http://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ1Y2M3ZjUxNTk0ZjI1ZWI5NjQxNjllMjcxMDliYzA5MWY4N0%Avira URL Cloudsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=10%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.tiro.comn-u0%Avira URL Cloudsafe
            https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meBoot.min.js0%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://pki.goog/gsr2/GTSGIAG3.crt0)0%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt0#0%URL Reputationsafe
            http://pomf.cat/upload.php&https://a.pomf.cat/0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplatebhv34B0.tmp.7.drfalse
              high
              https://www.google.com/chrome/static/images/folder-applications.svgbhv34B0.tmp.7.drfalse
                high
                https://www.google.com/chrome/static/css/main.v2.min.cssbhv34B0.tmp.7.drfalse
                  high
                  https://www.google.com/chrome/static/images/fallback/google-chrome-logo.jpgbhv34B0.tmp.7.drfalse
                    high
                    http://www.msn.combhv34B0.tmp.7.drfalse
                      high
                      http://www.fontbureau.com/designers60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                        high
                        http://www.nirsoft.netvbc.exe, 00000007.00000002.393310121.000000000019C000.00000004.00000001.sdmpfalse
                          high
                          https://deff.nelreports.net/api/report?cat=msnbhv34B0.tmp.7.drfalse
                          • URL Reputation: safe
                          unknown
                          http://google.com/chromebhv34B0.tmp.7.drfalse
                            high
                            https://contextual.media.net/__media__/js/util/nrrV9140.jsbhv34B0.tmp.7.drfalse
                              high
                              https://www.google.com/chrome/static/images/chrome-logo.svgbhv34B0.tmp.7.drfalse
                                high
                                https://www.google.com/chrome/static/images/homepage/homepage_features.pngbhv34B0.tmp.7.drfalse
                                  high
                                  https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.jsbhv34B0.tmp.7.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.pngbhv34B0.tmp.7.drfalse
                                    high
                                    http://www.sajatypeworks.com60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.google.com/chrome/bhv34B0.tmp.7.drfalse
                                      high
                                      http://www.founder.com.cn/cn/cThe60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Zbhv34B0.tmp.7.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://a.pomf.cat/60L3nw00Uk.exe, 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc13122162a9a46c3b4cbf05ffccde0fbhv34B0.tmp.7.drfalse
                                        high
                                        https://www.google.com/chrome/static/images/homepage/hero-anim-bottom-left.pngbhv34B0.tmp.7.drfalse
                                          high
                                          https://www.google.com/chrome/static/images/chrome_safari-behavior.jpgbhv34B0.tmp.7.drfalse
                                            high
                                            http://www.msn.com/?ocid=iehpvbc.exe, 00000007.00000003.390702879.0000000000954000.00000004.00000001.sdmp, bhv34B0.tmp.7.drfalse
                                              high
                                              https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCee0d4d5fd4424c8390d703b105f82c3bhv34B0.tmp.7.drfalse
                                                high
                                                http://crl.pki.goog/GTS1O1core.crl0bhv34B0.tmp.7.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com-60L3nw00Uk.exe, 00000002.00000002.379949260.0000000000E87000.00000004.00000040.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                http://www.galapagosdesign.com/DPlease60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://cvision.media.net/new/300x300/2/189/9/46/83cfba42-7d45-4670-a4a7-a3211ca07534.jpg?v=9bhv34B0.tmp.7.drfalse
                                                  high
                                                  https://www.google.com/chrome/static/images/icon-announcement.svgbhv34B0.tmp.7.drfalse
                                                    high
                                                    https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://cvbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390323605.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://www.fontbureau.comuevaq60L3nw00Uk.exe, 00000002.00000002.379949260.0000000000E87000.00000004.00000040.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.urwpp.deDPlease60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.nirsoft.net/vbc.exe, vbc.exe, 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmpfalse
                                                        high
                                                        http://www.zhongyicts.com.cn60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name60L3nw00Uk.exe, 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_fill%bhv34B0.tmp.7.drfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.google.com/chrome/static/images/homepage/hero-anim-middle.pngbhv34B0.tmp.7.drfalse
                                                            high
                                                            http://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ1Y2M3ZjUxNTk0ZjI1ZWI5NjQxNjllMjcxMDliYzA5MWY4Nbhv34B0.tmp.7.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.google.com/chrome/static/css/main.v3.min.cssbhv34B0.tmp.7.drfalse
                                                              high
                                                              https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=vbc.exe, 00000007.00000003.390702879.0000000000954000.00000004.00000001.sdmp, bhv34B0.tmp.7.drfalse
                                                                high
                                                                https://www.google.com/chrome/application/x-msdownloadC:bhv34B0.tmp.7.drfalse
                                                                  high
                                                                  https://www.google.com/chrome/static/images/fallback/icon-file-download.jpgbhv34B0.tmp.7.drfalse
                                                                    high
                                                                    https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eeebhv34B0.tmp.7.drfalse
                                                                      high
                                                                      https://optanon.blob.core.windows.net/skins/4.1.0/default_flat_top_two_button_black/v2/css/optanon.cbhv34B0.tmp.7.drfalse
                                                                        high
                                                                        http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.covbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          https://www.google.com/chrome/static/images/download-browser/pixel_phone.pngbhv34B0.tmp.7.drfalse
                                                                            high
                                                                            http://pki.goog/gsr2/GTS1O1.crt0bhv34B0.tmp.7.drfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1bhv34B0.tmp.7.drfalse
                                                                              high
                                                                              https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xmlbhv34B0.tmp.7.drfalse
                                                                                high
                                                                                https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindexvbc.exe, 00000007.00000003.392724368.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.392472113.000000000096E000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390971803.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390323605.0000000000963000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390529179.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390440637.000000000096D000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  https://www.google.com/chrome/static/images/app-store-download.pngbhv34B0.tmp.7.drfalse
                                                                                    high
                                                                                    https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.pngbhv34B0.tmp.7.drfalse
                                                                                      high
                                                                                      https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gbhv34B0.tmp.7.drfalse
                                                                                        high
                                                                                        https://contextual.media.net/bhv34B0.tmp.7.drfalse
                                                                                          high
                                                                                          https://optanon.blob.core.windows.net/skins/4.1.0/default_flat_top_two_button_black/v2/images/cookiebhv34B0.tmp.7.drfalse
                                                                                            high
                                                                                            https://pki.goog/repository/0bhv34B0.tmp.7.drfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1bhv34B0.tmp.7.drfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://srtb.msn.com/auction?a=de-ch&b=fa1a6a09db4c4f6fbf480b78c51caf60&c=MSN&d=http%3A%2F%2Fwww.msnbhv34B0.tmp.7.drfalse
                                                                                              high
                                                                                              https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736bhv34B0.tmp.7.drfalse
                                                                                                high
                                                                                                https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9bhv34B0.tmp.7.drfalse
                                                                                                  high
                                                                                                  http://www.carterandcone.coml60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  http://www.msn.com/bhv34B0.tmp.7.drfalse
                                                                                                    high
                                                                                                    https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC828bc1cde9f04b788c98b5423157734bhv34B0.tmp.7.drfalse
                                                                                                      high
                                                                                                      http://www.fontbureau.com/designers/frere-jones.html60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                        high
                                                                                                        http://www.tiro.comn-u60L3nw00Uk.exe, 00000002.00000003.344397438.0000000000E8C000.00000004.00000001.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://www.google.com/chromebhv34B0.tmp.7.drfalse
                                                                                                          high
                                                                                                          https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpgbhv34B0.tmp.7.drfalse
                                                                                                            high
                                                                                                            https://www.google.com/chrome/static/images/fallback/icon-twitter.jpgbhv34B0.tmp.7.drfalse
                                                                                                              high
                                                                                                              http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/consent/55a804bhv34B0.tmp.7.drfalse
                                                                                                                high
                                                                                                                https://contextual.media.net/803288796/fcmain.js?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3bhv34B0.tmp.7.drfalse
                                                                                                                  high
                                                                                                                  https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meBoot.min.jsbhv34B0.tmp.7.drfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://contextual.media.net/48/nrrV18753.jsbhv34B0.tmp.7.drfalse
                                                                                                                    high
                                                                                                                    https://www.google.com/chrome/static/images/fallback/icon-help.jpgbhv34B0.tmp.7.drfalse
                                                                                                                      high
                                                                                                                      https://cvision.media.net/new/286x175/2/189/134/171/257b11a9-f3a3-4bb3-9298-c791f456f3d0.jpg?v=9bhv34B0.tmp.7.drfalse
                                                                                                                        high
                                                                                                                        https://www.google.com/accounts/serviceloginvbc.exefalse
                                                                                                                          high
                                                                                                                          https://www.google.com/chrome/static/images/homepage/google-enterprise.pngbhv34B0.tmp.7.drfalse
                                                                                                                            high
                                                                                                                            https://www.google.com/chrome/static/images/homepage/google-dev.pngbhv34B0.tmp.7.drfalse
                                                                                                                              high
                                                                                                                              https://www.google.com/chrome/static/images/thank-you/thankyou-animation.jsonbhv34B0.tmp.7.drfalse
                                                                                                                                high
                                                                                                                                http://crl.pki.goog/gsr2/gsr2.crl0?bhv34B0.tmp.7.drfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                http://pki.goog/gsr2/GTSGIAG3.crt0)bhv34B0.tmp.7.drfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                https://www.google.com/bhv34B0.tmp.7.drfalse
                                                                                                                                  high
                                                                                                                                  https://www.google.com/chrome/static/images/fallback/icon-fb.jpgbhv34B0.tmp.7.drfalse
                                                                                                                                    high
                                                                                                                                    https://www.google.com/chrome/static/images/mac-ico.pngbhv34B0.tmp.7.drfalse
                                                                                                                                      high
                                                                                                                                      https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/vbc.exe, 00000007.00000003.391493195.000000000096D000.00000004.00000001.sdmp, vbc.exe, 00000007.00000003.390405135.0000000000963000.00000004.00000001.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://www.fontbureau.com/designersG60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://pki.goog/gsr2/GTS1O1.crt0#bhv34B0.tmp.7.drfalse
                                                                                                                                          • URL Reputation: safe
                                                                                                                                          unknown
                                                                                                                                          http://pomf.cat/upload.php&https://a.pomf.cat/60L3nw00Uk.exe, 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, 60L3nw00Uk.exe, 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmpfalse
                                                                                                                                          • Avira URL Cloud: safe
                                                                                                                                          unknown
                                                                                                                                          http://www.fontbureau.com/designers/?60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://www.founder.com.cn/cn/bThe60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                                                            • URL Reputation: safe
                                                                                                                                            unknown
                                                                                                                                            http://www.fontbureau.com/designers?60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://www.google.com/chrome/static/images/google-play-download.pngbhv34B0.tmp.7.drfalse
                                                                                                                                                high
                                                                                                                                                https://www.google.com/chrome/static/images/chrome_throbber_fast.gifbhv34B0.tmp.7.drfalse
                                                                                                                                                  high
                                                                                                                                                  https://www.google.com/chrome/static/images/homepage/google-canary.pngbhv34B0.tmp.7.drfalse
                                                                                                                                                    high
                                                                                                                                                    https://www.google.com/chrome/static/images/favicons/favicon-16x16.pngbhv34B0.tmp.7.drfalse
                                                                                                                                                      high
                                                                                                                                                      https://geolocation.onetrust.com/cookieconsentpub/v1/geo/locationbhv34B0.tmp.7.drfalse
                                                                                                                                                        high
                                                                                                                                                        http://www.tiro.com60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        http://www.goodfont.co.kr60L3nw00Uk.exe, 00000002.00000002.385496954.0000000006912000.00000004.00000001.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.pngbhv34B0.tmp.7.drfalse
                                                                                                                                                          high
                                                                                                                                                          https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.jsbhv34B0.tmp.7.drfalse
                                                                                                                                                            high
                                                                                                                                                            https://www.google.com/chrome/static/images/homepage/laptop_desktop.pngbhv34B0.tmp.7.drfalse
                                                                                                                                                              high

                                                                                                                                                              Contacted IPs

                                                                                                                                                              No contacted IP infos

                                                                                                                                                              General Information

                                                                                                                                                              Joe Sandbox Version:33.0.0 White Diamond
                                                                                                                                                              Analysis ID:474426
                                                                                                                                                              Start date:30.08.2021
                                                                                                                                                              Start time:23:48:21
                                                                                                                                                              Joe Sandbox Product:CloudBasic
                                                                                                                                                              Overall analysis duration:0h 11m 56s
                                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                                              Report type:light
                                                                                                                                                              Sample file name:60L3nw00Uk (renamed file extension from none to exe)
                                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                              Number of analysed new started processes analysed:26
                                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                                              Technologies:
                                                                                                                                                              • HCA enabled
                                                                                                                                                              • EGA enabled
                                                                                                                                                              • HDC enabled
                                                                                                                                                              • AMSI enabled
                                                                                                                                                              Analysis Mode:default
                                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                                              Detection:MAL
                                                                                                                                                              Classification:mal100.phis.troj.spyw.evad.winEXE@10/7@0/0
                                                                                                                                                              EGA Information:Failed
                                                                                                                                                              HDC Information:
                                                                                                                                                              • Successful, ratio: 97.4% (good quality ratio 94.5%)
                                                                                                                                                              • Quality average: 85.8%
                                                                                                                                                              • Quality standard deviation: 23%
                                                                                                                                                              HCA Information:
                                                                                                                                                              • Successful, ratio: 99%
                                                                                                                                                              • Number of executed functions: 0
                                                                                                                                                              • Number of non-executed functions: 0
                                                                                                                                                              Cookbook Comments:
                                                                                                                                                              • Adjust boot time
                                                                                                                                                              • Enable AMSI
                                                                                                                                                              Warnings:
                                                                                                                                                              Show All
                                                                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/474426/sample/60L3nw00Uk.exe

                                                                                                                                                              Simulations

                                                                                                                                                              Behavior and APIs

                                                                                                                                                              TimeTypeDescription
                                                                                                                                                              23:49:26API Interceptor2x Sleep call for process: 60L3nw00Uk.exe modified

                                                                                                                                                              Joe Sandbox View / Context

                                                                                                                                                              IPs

                                                                                                                                                              No context

                                                                                                                                                              Domains

                                                                                                                                                              No context

                                                                                                                                                              ASN

                                                                                                                                                              No context

                                                                                                                                                              JA3 Fingerprints

                                                                                                                                                              No context

                                                                                                                                                              Dropped Files

                                                                                                                                                              No context

                                                                                                                                                              Created / dropped Files

                                                                                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\60L3nw00Uk.exe.log
                                                                                                                                                              Process:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                                              Category:modified
                                                                                                                                                              Size (bytes):1216
                                                                                                                                                              Entropy (8bit):5.355304211458859
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                                                                                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                                                                                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                                                                                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                                                                                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                                                                                                              Malicious:true
                                                                                                                                                              Reputation:high, very likely benign file
                                                                                                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                                                                                              C:\Users\user\AppData\Local\Temp\387de725-2380-e2bc-684f-2ef6ffc1f7f9
                                                                                                                                                              Process:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                                                              Category:dropped
                                                                                                                                                              Size (bytes):64
                                                                                                                                                              Entropy (8bit):5.06602441389348
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:3:Bpx9fi2SE6ugiZkmrT:Bpx9fxS3vQ
                                                                                                                                                              MD5:D2CB687CF3F90F69C9C5EE8E3232136C
                                                                                                                                                              SHA1:B981B48FC19D78E43B28B3A8852C71CB1C8339B9
                                                                                                                                                              SHA-256:F5F6C8372D06061D8670662374289B3B913BCB5C0FCC26F4C08556619C303ADA
                                                                                                                                                              SHA-512:8C58595AB8ACF547F30A6EF386DDBD72A578ABC0018233D06C3E17F69A2D2DEF1C265437CE87BBD4D668EB4DACC24075B34692E75760206539B8F471AA2535F8
                                                                                                                                                              Malicious:false
                                                                                                                                                              Reputation:low
                                                                                                                                                              Preview: GTXq6lZGCzVwlrIPDHEkHHGVJ5dcMJa+E2adbYBKEGTTLAH5l2blnzzJ54Wymmv9
                                                                                                                                                              C:\Users\user\AppData\Local\Temp\bhv34B0.tmp
                                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                                                                                              File Type:Extensible storage user DataBase, version 0x620, checksum 0xe07be951, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                                                                              Category:dropped
                                                                                                                                                              Size (bytes):26738688
                                                                                                                                                              Entropy (8bit):0.8752026016464309
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:24576:kg+wP17f2sYFPHihgmKdTnjVccgeTaNX:esY5T
                                                                                                                                                              MD5:E12C1D81734B65D7158F3564AE173818
                                                                                                                                                              SHA1:57AB6A414A22AE6DD0D7A90F5F257F4BFBD2F9AC
                                                                                                                                                              SHA-256:C18D5A6806F58730F504524416E484AB12A0FF2092F24CA3EC346776F9B1C8B5
                                                                                                                                                              SHA-512:368C15D5E97211BB97A080537E6CF1FAD23EFA40EF8DFFF4358560F6A92B3ADE37245D48E3D9C39F60A18CF03AE1483CA43AF19842C052F61E268205A33B6E6B
                                                                                                                                                              Malicious:false
                                                                                                                                                              Reputation:low
                                                                                                                                                              Preview: .{.Q... .......p........Ef..4...w........................%......1...y...1...y).h.'............................W.4...w..............................................................................................[............B.................................................................................................................. ........1...y..........................................................................................................................................................................................................................................1...y.w................/..`.1...y).........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                              C:\Users\user\AppData\Local\Temp\tmp16F.tmp
                                                                                                                                                              Process:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                              Category:dropped
                                                                                                                                                              Size (bytes):1654
                                                                                                                                                              Entropy (8bit):5.155096980221409
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB35tn:cbha7JlNQV/rydbz9I3YODOLNdq3h
                                                                                                                                                              MD5:D366A6E1AB4A8F27DFEFC6E0B22E626B
                                                                                                                                                              SHA1:9E3D3561C5EA98AB3874402375E1C106830509ED
                                                                                                                                                              SHA-256:2345F5458DA189D397660707855E1F04880FB57D9DED065FC0FB9028907D389F
                                                                                                                                                              SHA-512:4745C808EAAF878930E7831E413FFDB223A6D83DAFAA8A162A31620907857F3517EBC95B5900A63CC044CC5B7FB3A1282FB470E435363A82A2A9FCBCE836397D
                                                                                                                                                              Malicious:true
                                                                                                                                                              Reputation:low
                                                                                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                                                                                                              C:\Users\user\AppData\Local\Temp\tmp9B04.tmp
                                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                                                                                              File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                                                                                                              Category:dropped
                                                                                                                                                              Size (bytes):2
                                                                                                                                                              Entropy (8bit):1.0
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:3:Qn:Qn
                                                                                                                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                                                              Malicious:false
                                                                                                                                                              Preview: ..
                                                                                                                                                              C:\Users\user\AppData\Roaming\UaoePQDdm.exe
                                                                                                                                                              Process:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                              Category:dropped
                                                                                                                                                              Size (bytes):1222144
                                                                                                                                                              Entropy (8bit):7.407764268193867
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:12288:9ObrmTJfbAGG64rJr7MWUXApfe1I3ri7Ta8OFAzRfV/ZH1CFnws3uThJnaSFvpRH:l5NeJnNfe1uri725ID1G3uNMSFxHH/5
                                                                                                                                                              MD5:1E6EC142BA08C7DEAFD25BDEA76F32D4
                                                                                                                                                              SHA1:6B52334CA53B1C604C5865E2AB49056B870808C5
                                                                                                                                                              SHA-256:E773F60AEB241F884B4F932D7DDD4E31C87F31781D5BD53D8583B3D54807A449
                                                                                                                                                              SHA-512:70D7E937546384ECAFD26978C486F7626076DC403EE6B78051BF2A4F5CDA7A9733ABD566FACE813B93D1A6152494B9B57666BFAECD90122C0DFF126116BB4928
                                                                                                                                                              Malicious:true
                                                                                                                                                              Antivirus:
                                                                                                                                                              • Antivirus: Metadefender, Detection: 26%, Browse
                                                                                                                                                              • Antivirus: ReversingLabs, Detection: 65%
                                                                                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$'a.............................6... ...@....@.. ....................................@..................................5..W....`..x....................@....................................................... ............... ..H............text........ ...................... ..`.reloc.......@......................@..B.rsrc...x....`......................@..@.................5......H.......P...X9..........\h..............................................z.(......}.....(....o....}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s....z.2.{.....5...*....0..<........{......3..{....(....o....3...}......+..s.......{....}..
                                                                                                                                                              C:\Users\user\AppData\Roaming\UaoePQDdm.exe:Zone.Identifier
                                                                                                                                                              Process:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                                              Category:dropped
                                                                                                                                                              Size (bytes):26
                                                                                                                                                              Entropy (8bit):3.95006375643621
                                                                                                                                                              Encrypted:false
                                                                                                                                                              SSDEEP:3:ggPYV:rPYV
                                                                                                                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                              Malicious:false
                                                                                                                                                              Preview: [ZoneTransfer]....ZoneId=0

                                                                                                                                                              Static File Info

                                                                                                                                                              General

                                                                                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                              Entropy (8bit):7.407764268193867
                                                                                                                                                              TrID:
                                                                                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                                                              • Windows Screen Saver (13104/52) 0.07%
                                                                                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                                                              File name:60L3nw00Uk.exe
                                                                                                                                                              File size:1222144
                                                                                                                                                              MD5:1e6ec142ba08c7deafd25bdea76f32d4
                                                                                                                                                              SHA1:6b52334ca53b1c604c5865e2ab49056b870808c5
                                                                                                                                                              SHA256:e773f60aeb241f884b4f932d7ddd4e31c87f31781d5bd53d8583b3d54807a449
                                                                                                                                                              SHA512:70d7e937546384ecafd26978c486f7626076dc403ee6b78051bf2a4f5cda7a9733abd566face813b93d1a6152494b9b57666bfaecd90122c0dff126116bb4928
                                                                                                                                                              SSDEEP:12288:9ObrmTJfbAGG64rJr7MWUXApfe1I3ri7Ta8OFAzRfV/ZH1CFnws3uThJnaSFvpRH:l5NeJnNfe1uri725ID1G3uNMSFxHH/5
                                                                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$'a.............................6... ...@....@.. ....................................@................................

                                                                                                                                                              File Icon

                                                                                                                                                              Icon Hash:4545656561010309

                                                                                                                                                              Network Behavior

                                                                                                                                                              No network behavior found

                                                                                                                                                              Code Manipulations

                                                                                                                                                              Statistics

                                                                                                                                                              Behavior

                                                                                                                                                              Click to jump to process

                                                                                                                                                              System Behavior

                                                                                                                                                              General

                                                                                                                                                              Start time:23:49:16
                                                                                                                                                              Start date:30/08/2021
                                                                                                                                                              Path:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                              Commandline:'C:\Users\user\Desktop\60L3nw00Uk.exe'
                                                                                                                                                              Imagebase:0x420000
                                                                                                                                                              File size:1222144 bytes
                                                                                                                                                              MD5 hash:1E6EC142BA08C7DEAFD25BDEA76F32D4
                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                                                                              Yara matches:
                                                                                                                                                              • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.381558466.0000000003987000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.380209170.0000000002891000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.382445641.0000000003B17000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              Reputation:low

                                                                                                                                                              General

                                                                                                                                                              Start time:23:49:35
                                                                                                                                                              Start date:30/08/2021
                                                                                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UaoePQDdm' /XML 'C:\Users\user\AppData\Local\Temp\tmp16F.tmp'
                                                                                                                                                              Imagebase:0x70000
                                                                                                                                                              File size:185856 bytes
                                                                                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                              Reputation:high

                                                                                                                                                              General

                                                                                                                                                              Start time:23:49:35
                                                                                                                                                              Start date:30/08/2021
                                                                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                                                                              Wow64 process (32bit):false
                                                                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                              Imagebase:0x7ff61de10000
                                                                                                                                                              File size:625664 bytes
                                                                                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                              Reputation:high

                                                                                                                                                              General

                                                                                                                                                              Start time:23:49:36
                                                                                                                                                              Start date:30/08/2021
                                                                                                                                                              Path:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                              Commandline:C:\Users\user\Desktop\60L3nw00Uk.exe
                                                                                                                                                              Imagebase:0x8b0000
                                                                                                                                                              File size:1222144 bytes
                                                                                                                                                              MD5 hash:1E6EC142BA08C7DEAFD25BDEA76F32D4
                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                                                                              Yara matches:
                                                                                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000006.00000002.605633875.0000000002E0F000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000006.00000003.379220023.0000000004565000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000006.00000002.603039803.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000006.00000002.606069494.0000000003CF5000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000006.00000002.606069494.0000000003CF5000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000006.00000002.604780389.0000000002D03000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                              Reputation:low

                                                                                                                                                              General

                                                                                                                                                              Start time:23:49:39
                                                                                                                                                              Start date:30/08/2021
                                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                              Commandline:'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9B04.tmp'
                                                                                                                                                              Imagebase:0x400000
                                                                                                                                                              File size:1171592 bytes
                                                                                                                                                              MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                              Yara matches:
                                                                                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000007.00000002.393358492.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                              Reputation:high

                                                                                                                                                              General

                                                                                                                                                              Start time:23:50:43
                                                                                                                                                              Start date:30/08/2021
                                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                              Commandline:'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp9795.tmp'
                                                                                                                                                              Imagebase:0x400000
                                                                                                                                                              File size:1171592 bytes
                                                                                                                                                              MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                              Yara matches:
                                                                                                                                                              • Rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1, Description: Detects BabyShark KimJongRAT, Source: 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000016.00000002.523503971.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                              Reputation:high

                                                                                                                                                              Disassembly

                                                                                                                                                              Code Analysis

                                                                                                                                                              Reset < >