Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
40987654323456789098746789098765432345678.exe

Overview

General Information

Sample Name:40987654323456789098746789098765432345678.exe
Analysis ID:562497
MD5:b9a4dbf6bb05c4fe97ba541dcf555e70
SHA1:0de7dc340d03d0144aef6692762c482e731f1717
SHA256:69bae63d802887e2d994022011465c7f0bc42b1f0adefcee8dcbbfe243118b15
Tags:exeMatiex
Infos:

Detection

AgentTesla Matiex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Matiex Keylogger
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Machine Learning detection for sample
Yara detected Beds Obfuscator
May check the online IP address of the machine
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Sigma detected: Suspicious Outbound SMTP Connections
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Email": "reservaciones@hoteljuaninos.com.mx", "Password": "3}l^pI#_4K_!", "Server": "serv3.devmexico.com", "Receiver": "saleseuropower2@yandex.com", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_MatiexYara detected Matiex KeyloggerJoe Security
          00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
            Click to see the 29 entries
            SourceRuleDescriptionAuthorStrings
            1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.unpackMALWARE_Win_MatiexMatiex/XetimaLogger keylogger payloadditekSHen
            • 0x2c69:$s6: get_logins
            • 0x403e:$pdb: \Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb
            1.2.40987654323456789098746789098765432345678.exe.49a068c.8.unpackMALWARE_Win_MatiexMatiex/XetimaLogger keylogger payloadditekSHen
            • 0x2c69:$s6: get_logins
            • 0x403e:$pdb: \Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb
            1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.unpackMALWARE_Win_MatiexMatiex/XetimaLogger keylogger payloadditekSHen
            • 0x2c69:$s6: get_logins
            • 0x403e:$pdb: \Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb
            1.0.40987654323456789098746789098765432345678.exe.400000.3.unpackJoeSecurity_MatiexYara detected Matiex KeyloggerJoe Security
              1.0.40987654323456789098746789098765432345678.exe.400000.3.unpackMALWARE_Win_MatiexMatiex/XetimaLogger keylogger payloadditekSHen
              • 0x2aca7:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2acd6:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2acf8:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ad18:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ad3d:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ad7a:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ada9:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2adcb:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2adeb:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ae10:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ae31:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ae60:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2ae82:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2aea2:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2aec7:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2aee8:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2af17:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2af39:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2af59:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2af7e:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              • 0x2af9f:$id: --M-A-T-I-E-X--K-E-Y-L-O-G-E-R--
              Click to see the 181 entries

              System Summary

              barindex
              Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke (rule): Data: Image: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe, QueryName: checkip.dyndns.org
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 72.55.153.12, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe, Initiated: true, ProcessId: 7136, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49773

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpackMalware Configuration Extractor: Matiex {"Exfil Mode": "SMTP", "Email": "reservaciones@hoteljuaninos.com.mx", "Password": "3}l^pI#_4K_!", "Server": "serv3.devmexico.com", "Receiver": "saleseuropower2@yandex.com", "Port": "587"}
              Source: 40987654323456789098746789098765432345678.exeReversingLabs: Detection: 20%
              Source: 40987654323456789098746789098765432345678.exeJoe Sandbox ML: detected
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpackAvira: Label: TR/Redcap.jajcu
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpackAvira: Label: TR/Redcap.jajcu
              Source: 40987654323456789098746789098765432345678.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: unknownHTTPS traffic detected: 172.67.188.154:443 -> 192.168.2.6:49767 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: 40987654323456789098746789098765432345678.exe, 00000000.00000003.360923765.000000001AEE0000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000000.00000003.370539091.000000001B070000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 40987654323456789098746789098765432345678.exe, 00000000.00000003.360923765.000000001AEE0000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000000.00000003.370539091.000000001B070000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb source: 40987654323456789098746789098765432345678.exe, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdbh} source: 40987654323456789098746789098765432345678.exe, 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00402630 FindFirstFileA,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00404A29 FindFirstFileExW,

              Networking

              barindex
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeDNS query: name: checkip.dyndns.org
              Source: Joe Sandbox ViewASN Name: IWEB-ASCA IWEB-ASCA
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: global trafficHTTP traffic detected: GET /xml/102.129.143.61 HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.143.61 HTTP/1.1Host: freegeoip.app
              Source: global trafficHTTP traffic detected: GET /xml/102.129.143.61 HTTP/1.1Host: freegeoip.app
              Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
              Source: unknownHTTPS traffic detected: 172.67.188.154:443 -> 192.168.2.6:49767 version: TLS 1.0
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficTCP traffic: 192.168.2.6:49773 -> 72.55.153.12:587
              Source: global trafficTCP traffic: 192.168.2.6:49773 -> 72.55.153.12:587
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/HB
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622275055.0000000002656000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622190355.000000000260A000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622300360.0000000002661000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgD8
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodogo
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622114637.00000000025E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
              Source: 40987654323456789098746789098765432345678.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: 40987654323456789098746789098765432345678.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com07
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://serv3.devmexico.com
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=Createutf-8Win32_ComputerSystemModelManufactu
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/102.129.143.61
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/102.129.143.61x
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app4
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622275055.0000000002656000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622190355.000000000260A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.appD8
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://i.imgur.com/GJD7Q5y.png195.239.51.11795.26.248.2989.208.29.13389.187.165.4792.118.13.1895.26
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622300360.0000000002661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.geodatatool.com/en/?ip=
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622300360.0000000002661000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.geodatatool.com/en/?ip=102.129.143.61
              Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.143.61 HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.143.61 HTTP/1.1Host: freegeoip.app
              Source: global trafficHTTP traffic detected: GET /xml/102.129.143.61 HTTP/1.1Host: freegeoip.app
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

              System Summary

              barindex
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPEMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables packed with ConfuserEx Mod Beds Protector Author: ditekSHen
              Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Matiex/XetimaLogger keylogger payload Author: ditekSHen
              Source: 40987654323456789098746789098765432345678.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector snort2_sid = 930019-930024, author = ditekSHen, description = Detects executables packed with ConfuserEx Mod Beds Protector, snort3_sid = 930007-930008
              Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Matiex author = ditekSHen, description = Matiex/XetimaLogger keylogger payload, clamav_sig = MALWARE.Win.Trojan.MatiexKeylogger
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_0040604C
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00404772
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_0040A2A5
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022BC798
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022BCAE0
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022B0DE0
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022BD3B0
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022B1441
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022B1958
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_022B1E70
              Source: 40987654323456789098746789098765432345678.exe, 00000000.00000003.362469965.000000001B18F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000000.00000003.361054894.000000001AFF6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exeBinary or memory string: OriginalFilename vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.620770687.0000000000196000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNXT.exe* vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameL.exe4 vs 40987654323456789098746789098765432345678.exe
              Source: 40987654323456789098746789098765432345678.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: 40987654323456789098746789098765432345678.exeReversingLabs: Detection: 20%
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeJump to behavior
              Source: 40987654323456789098746789098765432345678.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe "C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe"
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess created: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe "C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe"
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess created: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe "C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe"
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile created: C:\Users\user\AppData\Local\Temp\nsx2A5.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@4/3
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Binary string: wntdll.pdbUGP source: 40987654323456789098746789098765432345678.exe, 00000000.00000003.360923765.000000001AEE0000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000000.00000003.370539091.000000001B070000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 40987654323456789098746789098765432345678.exe, 00000000.00000003.360923765.000000001AEE0000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000000.00000003.370539091.000000001B070000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdb source: 40987654323456789098746789098765432345678.exe, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: D:\Before FprmT\Document VB project\FireFox Stub\FireFox Stub\obj\Debug\VNXT.pdbh} source: 40987654323456789098746789098765432345678.exe, 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369853457.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00412E32 push edi; ret
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00412E37 push edi; ret
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00401F16 push ecx; ret
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile created: C:\Users\user\AppData\Local\Temp\nss2D6.tmp\acznqbhdm.dllJump to dropped file
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369853457.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -8301034833169293s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -100000s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2392Thread sleep count: 1930 > 30
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99797s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99656s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99531s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99422s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99297s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2392Thread sleep count: 3224 > 30
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99187s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -99074s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98953s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98843s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98734s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98625s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98515s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98406s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98297s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98185s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -98078s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97968s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97844s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97715s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97592s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97422s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97312s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97203s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -97093s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96984s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96874s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96765s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96656s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96546s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96437s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96328s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -96218s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe TID: 2384Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeWindow / User API: threadDelayed 1930
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeWindow / User API: threadDelayed 3224
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00402630 FindFirstFileA,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00404A29 FindFirstFileExW,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 100000
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99797
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99656
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99531
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99422
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99297
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99187
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 99074
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98953
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98843
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98734
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98625
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98515
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98406
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98297
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98185
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 98078
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97968
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97844
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97715
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97592
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97422
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97312
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97203
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 97093
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96984
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96874
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96765
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96656
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96546
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96437
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96328
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 96218
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile Volume queried: C:\ FullSizeInformation
              Source: 40987654323456789098746789098765432345678.exe, 00000001.00000002.623654083.00000000055A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_004067FE GetProcessHeap,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_004035F1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeMemory allocated: page read and write | page guard
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00401E1D SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeProcess created: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe "C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe"
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_0040208D cpuid
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 1_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369853457.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR
              Source: Yara matchFile source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR
              Source: Yara matchFile source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\Desktop\40987654323456789098746789098765432345678.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
              Source: Yara matchFile source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.49a068c.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.4356e4.13.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4a4248c.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.415058.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.783060.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3565bbc.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.415058.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae91ae4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4980000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae60000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.40987654323456789098746789098765432345678.exe.1ae71458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.4356e4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.3545530.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.40987654323456789098746789098765432345678.exe.7a36ec.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.369853457.0000000000414000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR
              Source: Yara matchFile source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 40987654323456789098746789098765432345678.exe PID: 7136, type: MEMORYSTR
              Source: Yara matchFile source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Windows Management Instrumentation
              Path Interception11
              Process Injection
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium1
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              System Shutdown/Reboot
              Default Accounts1
              Native API
              Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Obfuscated Files or Information
              LSASS Memory2
              File and Directory Discovery
              Remote Desktop Protocol1
              Data from Local System
              Exfiltration Over Bluetooth11
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Software Packing
              Security Account Manager37
              System Information Discovery
              SMB/Windows Admin Shares1
              Email Collection
              Automated Exfiltration1
              Non-Standard Port
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
              Virtualization/Sandbox Evasion
              NTDS1
              Query Registry
              Distributed Component Object Model1
              Clipboard Data
              Scheduled Transfer2
              Non-Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
              Process Injection
              LSA Secrets31
              Security Software Discovery
              SSHKeyloggingData Transfer Size Limits23
              Application Layer Protocol
              Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
              Process Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync31
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              Application Window Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
              Remote System Discovery
              Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
              System Network Configuration Discovery
              Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              40987654323456789098746789098765432345678.exe21%ReversingLabsWin32.Trojan.GenericML
              40987654323456789098746789098765432345678.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              1.0.40987654323456789098746789098765432345678.exe.400000.9.unpack100%AviraTR/Redcap.jajcuDownload File
              1.2.40987654323456789098746789098765432345678.exe.4a20000.9.unpack100%AviraTR/Redcap.jajcuDownload File
              1.0.40987654323456789098746789098765432345678.exe.400000.12.unpack100%AviraTR/Redcap.jajcuDownload File
              1.0.40987654323456789098746789098765432345678.exe.400000.6.unpack100%AviraTR/Redcap.jajcuDownload File
              1.0.40987654323456789098746789098765432345678.exe.400000.8.unpack100%AviraTR/Redcap.jajcuDownload File
              1.0.40987654323456789098746789098765432345678.exe.400000.7.unpack100%AviraTR/Redcap.jajcuDownload File
              1.2.40987654323456789098746789098765432345678.exe.400000.2.unpack100%AviraTR/Redcap.jajcuDownload File
              1.0.40987654323456789098746789098765432345678.exe.400000.5.unpack100%AviraTR/Redcap.jajcuDownload File
              1.0.40987654323456789098746789098765432345678.exe.400000.4.unpack100%AviraTR/Redcap.jajcuDownload File
              SourceDetectionScannerLabelLink
              serv3.devmexico.com0%VirustotalBrowse
              freegeoip.app2%VirustotalBrowse
              checkip.dyndns.com0%VirustotalBrowse
              checkip.dyndns.org1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://checkip.dyndns.org40%URL Reputationsafe
              https://freegeoip.app/xml/0%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://checkip.dyndns.org/0%URL Reputationsafe
              https://freegeoip.app/xml/102.129.143.610%Avira URL Cloudsafe
              https://freegeoip.app/xml/102.129.143.61x0%Avira URL Cloudsafe
              https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/0%URL Reputationsafe
              https://freegeoip.appD80%Avira URL Cloudsafe
              http://checkip.dyndns.org/HB0%URL Reputationsafe
              https://freegeoip.app0%URL Reputationsafe
              https://www.geodatatool.com/en/?ip=0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              https://freegeoip.app40%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              http://crl.comodogo0%Avira URL Cloudsafe
              https://www.geodatatool.com/en/?ip=102.129.143.610%Avira URL Cloudsafe
              http://freegeoip.app0%URL Reputationsafe
              http://serv3.devmexico.com0%Avira URL Cloudsafe
              http://checkip.dyndns.orgD80%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              serv3.devmexico.com
              72.55.153.12
              truetrueunknown
              freegeoip.app
              172.67.188.154
              truefalseunknown
              checkip.dyndns.com
              193.122.130.0
              truefalseunknown
              checkip.dyndns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/false
              • URL Reputation: safe
              unknown
              https://freegeoip.app/xml/102.129.143.61false
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org440987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://freegeoip.app/xml/40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://sectigo.com/CPS040987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://nsis.sf.net/NSIS_Error40987654323456789098746789098765432345678.exefalse
                high
                https://freegeoip.app/xml/102.129.143.61x40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://freegeoip.app/xml/LoadTimeZoneCountryNameCountryCodehttps://www.geodatatool.com/en/?ip=/40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://freegeoip.appD840987654323456789098746789098765432345678.exe, 00000001.00000002.622275055.0000000002656000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622190355.000000000260A000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://checkip.dyndns.org/HB40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://freegeoip.app40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://api.telegram.org/bot/sendMessage?chat_id=&text=Createutf-8Win32_ComputerSystemModelManufactu40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.geodatatool.com/en/?ip=40987654323456789098746789098765432345678.exe, 00000001.00000002.622300360.0000000002661000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.org40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://freegeoip.app440987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.com40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorError40987654323456789098746789098765432345678.exefalse
                    high
                    http://crl.comodogo40987654323456789098746789098765432345678.exe, 00000001.00000002.623685922.00000000055B4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name40987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://i.imgur.com/GJD7Q5y.png195.239.51.11795.26.248.2989.208.29.13389.187.165.4792.118.13.1895.2640987654323456789098746789098765432345678.exe, 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.geodatatool.com/en/?ip=102.129.143.6140987654323456789098746789098765432345678.exe, 00000001.00000002.622300360.0000000002661000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://freegeoip.app40987654323456789098746789098765432345678.exe, 00000001.00000002.622114637.00000000025E8000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://serv3.devmexico.com40987654323456789098746789098765432345678.exe, 00000001.00000002.622514110.00000000026F3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://checkip.dyndns.orgD840987654323456789098746789098765432345678.exe, 00000001.00000002.622275055.0000000002656000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622190355.000000000260A000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622300360.0000000002661000.00000004.00000800.00020000.00000000.sdmp, 40987654323456789098746789098765432345678.exe, 00000001.00000002.622086505.00000000025C7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        72.55.153.12
                        serv3.devmexico.comCanada
                        32613IWEB-ASCAtrue
                        193.122.130.0
                        checkip.dyndns.comUnited States
                        31898ORACLE-BMC-31898USfalse
                        172.67.188.154
                        freegeoip.appUnited States
                        13335CLOUDFLARENETUSfalse
                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:562497
                        Start date:28.01.2022
                        Start time:22:57:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 10m 14s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:40987654323456789098746789098765432345678.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:21
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/4@4/3
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 22.5% (good quality ratio 21.3%)
                        • Quality average: 79.1%
                        • Quality standard deviation: 28.8%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        22:58:46API Interceptor33x Sleep call for process: 40987654323456789098746789098765432345678.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):515071
                        Entropy (8bit):7.9436372306617
                        Encrypted:false
                        SSDEEP:6144:ayU9MtZgUT0JWDYGicvW5De2drRCTeM4+zS1/Z6+926eDCpTdQy6sW56gHyr2DKa:BMg3DKDe2drXMfzS1h7JJNcxZ
                        MD5:FF03921266A85F7137CBF64BB65A6BC1
                        SHA1:7A7634450F57E85749EFB475FE51657748816294
                        SHA-256:302F4D617B1AC33DC3A2B64DCD239D09AF4808D64184DFC61973794E52917E69
                        SHA-512:1102B8D235F36CA1082CD71C1CDC6A7AB0B8338D192CC74AFA30F834033A9D89464A4981AA4707964297AF5EA578D136F004E0255B038A4D5BC5037DFAB2B827
                        Malicious:false
                        Reputation:low
                        Preview:.6....G.F...j.2..Jf..Z.v.lp..n....K..._.#...8>.j5.>m...+..9m...[..4...Ka,.6...]..~..%a'tW..^...z.|j&.^..M...&,..i.E..T...?..!.......@.FYa.meh.U.2./..l#.=..v:..*m_.<.....+d.......?..j.Vj.1......n....X..I;]dS.8.(.j......z..t,..3....WWy.T.L....a..3....,4...G..~......?k}.Z.v.lp.!n`|:......_.k...8>..j5..m..K+..ZC.R}Yf..:...a....O...).3.y%UIH.2....f.6)..L=.;A.\1.B...<.H..T...?1:?.p..x.....>a[F.1.c..L..U..Q.M.N...h.</..gV...Z...K.$Q,./.z......!.1.E+J.|S....X.....`..C....C/......4..E4Eok..a..3...+..p.G......2...f..L.v.lp..n....K.U.....lx.8>U.j5..m...+..;m.R.Yf.$:.x.s....GI..S.3.yOw.H..x...f...!L=];A.\1.B..?....c..c..?k:?.pW0x...Cc\[F...Bp0L..U..Q.."....h.<....g....w..^s..$Q,./.z....~...1.E+J.|....X.....`..C.'..@l......4..E4Eok..a..3....,4...G.s.....2..Jf..Z.v.lp..n....K..._.#...8>.j5.>m...+..Zm.R.Yf.$:.x.s....O...).3.y%..H......f..).!L=];A.\1.B.....H..T...?1:?.p..x....C>a[F...Bp0L..U..Q.M.N...h.</..gV....{.^K.$Q,./.z......!.1.E+J.|....X.....`..C.'..@l.
                        Process:C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):565236
                        Entropy (8bit):7.834489107893738
                        Encrypted:false
                        SSDEEP:6144:zvyU9MtZgUT0JWDYGicvW5De2drRCTeM4+zS1/Z6+926eDCpTdQy6sW56gHyr2D8:WMg3DKDe2drXMfzS1h7JJNcxra
                        MD5:42DB401546C1E306D92032E59872BC63
                        SHA1:C168FA80DE4EEA76E2367B4CA7BA8AD9CD09DB73
                        SHA-256:6975456069D3465334BD42B40571883F3BCB937165A6C39F0A0DE8FD8284FC0C
                        SHA-512:FA84B0F1CEAC4405A6449478914D4E83D17D9ECF99B17C91317602C7FF6F4448CE1367B5C21053DEBA2192BE8EDF0D8F767364759E985003EAF1DE63210B22F2
                        Malicious:false
                        Reputation:low
                        Preview:"h......,...................a....P......<g.......h..........................................................................................................................................................................................................................................J...................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):18432
                        Entropy (8bit):5.815071950840657
                        Encrypted:false
                        SSDEEP:384:EGYQUq/6vARAa5OW2xbj11RRNaicIhI1z5plEeNPy:E8xS4R6xHRDaL8arl
                        MD5:B520B52BB5DB616D8768AD5CDB83E86D
                        SHA1:B7E44B9C5D77059D33A84378C7CDC4C47140D56E
                        SHA-256:6C0BC5EBBE6CDA42B607E181D902C4B4AC74A72A4915971E72B4B4335FBD92A2
                        SHA-512:767EFC549E3B48B850E6A82FB005A793D3D0F556B94E4D2B79EF7EDA5AD4144245758C89F809914D264A99AD75137D14A0F43D3CB2A665D095DC83F026C9576C
                        Malicious:false
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H...H...H...#...H...H..H..k....H..k....H..n.!..H..k....H..Rich.H..........................PE..L......a...........!.....6...................P............................................@.........................0Q..H...xQ.......`.......................p.......................................................P..0............................text....5.......6.................. ..`.rdata..l....P.......:..............@..@.rsrc........`.......D..............@..@.reloc.......p.......F..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):5059
                        Entropy (8bit):6.144036122014603
                        Encrypted:false
                        SSDEEP:96:pdMrJV6DpHD6D3QvSDwgNvZsT5kauwcagW0wpTVTFRJeDM7jZVAG/B95rfMQi91w:I6JmEqkgNA5kauwFD0wpVXQD0jAG/H5L
                        MD5:2534149A421CDF4657CB9DD951958955
                        SHA1:5FC401EB45D83A09B3694C5718BEE8DF4F8452AF
                        SHA-256:CE7851DAE807418C1A2A5FB8F1A3EF76F1889E360F6DA80F79B040FEC5DAC6DD
                        SHA-512:EA801E10A8F9AF2EE164A98BC44F0F516ED70234DB73D18B8103ACB81593A367568C224830177C41B89A5CB9EE1A60582F98378862DF9FE4D911BD55389F23BE
                        Malicious:false
                        Reputation:low
                        Preview:p1..$RmZm.*'&Z.y..&I......&I.....Z.....}....Z.~..~..L....|...P.1P$.~..~..L........P..P$.~..~..L........P..P$.~..~..L....?...P.IP$.Z........I....`P..P$uR..Z...P..P.mR..R.}L.... ..R...$}L.P.}&'P.Zuy......Z....}~.1 ~..#~....~.I. ~...~...T....!R..!P...Zo..y~.1.#R....P.y..}............Z..R...R.y.."Rt...$Rm((.&I.....R..R......R..R.R..R.P$.R...P.}R..R..R..P.R..R$}Rt..................~...............b..%........$RmZm..&I...........L.1P.}Z.....R.}...R.}.P.}R..!P..ru....TI..R..`.. .P..1P%.L..`.. .x.P..1P%......I.L..1...~.........|~~P..r.L...~...~~~P..Z.....Z.y.r..y...R.yRt...$RmZm..&I............L.IP.}Z.....R.}...R.}.P.}R..!P..ru....TI.US...R..`.. .P..IP%.R..`.. .x.P..IP%.R..`.. .xP..IP%.R.....#..P..IP..L..`.. .x.P..IP%......I.L..I.....w.....z}~~P..Z.q...R..R.qP.r.~.q~..~..~..~....~~P..Z.....Z.y.r..y...R.yRt...$RmZm......L.uP.}Z.....R.}...R.}.P.}R..!P..ru....TI..R..`.. .P..uP%.R..`.. .x.P..uP%......I.L..u....b.........}~~P..r.~.
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.258523481775096
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 92.16%
                        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:40987654323456789098746789098765432345678.exe
                        File size:475331
                        MD5:b9a4dbf6bb05c4fe97ba541dcf555e70
                        SHA1:0de7dc340d03d0144aef6692762c482e731f1717
                        SHA256:69bae63d802887e2d994022011465c7f0bc42b1f0adefcee8dcbbfe243118b15
                        SHA512:d9682bf0d38feb0dacc75826928734bf7165e39e44d450392d50f6a6aedf5bf1adf13f9a8556007243299f0c6cae5646df8c6a2de6db5c1ebb759ec79c6b6cee
                        SSDEEP:12288:/whN8YO3U85QtT7ptTABux9O1GN9oBMZkDVcX:4f83Mt/ptTsusARZEVy
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....
                        Icon Hash:d4ccf0f0f0f8f030
                        Entrypoint:0x403225
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                        DLL Characteristics:
                        Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:099c0646ea7282d232219f8807883be0
                        Instruction
                        sub esp, 00000180h
                        push ebx
                        push ebp
                        push esi
                        xor ebx, ebx
                        push edi
                        mov dword ptr [esp+18h], ebx
                        mov dword ptr [esp+10h], 00409128h
                        xor esi, esi
                        mov byte ptr [esp+14h], 00000020h
                        call dword ptr [00407030h]
                        push 00008001h
                        call dword ptr [004070B4h]
                        push ebx
                        call dword ptr [0040727Ch]
                        push 00000008h
                        mov dword ptr [00423F58h], eax
                        call 00007FEE40711300h
                        mov dword ptr [00423EA4h], eax
                        push ebx
                        lea eax, dword ptr [esp+34h]
                        push 00000160h
                        push eax
                        push ebx
                        push 0041F450h
                        call dword ptr [00407158h]
                        push 004091B0h
                        push 004236A0h
                        call 00007FEE40710FB7h
                        call dword ptr [004070B0h]
                        mov edi, 00429000h
                        push eax
                        push edi
                        call 00007FEE40710FA5h
                        push ebx
                        call dword ptr [0040710Ch]
                        cmp byte ptr [00429000h], 00000022h
                        mov dword ptr [00423EA0h], eax
                        mov eax, edi
                        jne 00007FEE4070E7CCh
                        mov byte ptr [esp+14h], 00000022h
                        mov eax, 00429001h
                        push dword ptr [esp+14h]
                        push eax
                        call 00007FEE40710A98h
                        push eax
                        call dword ptr [0040721Ch]
                        mov dword ptr [esp+1Ch], eax
                        jmp 00007FEE4070E825h
                        cmp cl, 00000020h
                        jne 00007FEE4070E7C8h
                        inc eax
                        cmp byte ptr [eax], 00000020h
                        je 00007FEE4070E7BCh
                        cmp byte ptr [eax], 00000022h
                        mov byte ptr [eax+eax+00h], 00000000h
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x2e788.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x2c0000x2e7880x2e800False0.304666498656data5.45096399849IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x2c3100x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                        RT_ICON0x3cb380x94a8dataEnglishUnited States
                        RT_ICON0x45fe00x67bdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                        RT_ICON0x4c7a00x5488dataEnglishUnited States
                        RT_ICON0x51c280x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 255, next used block 4278190080EnglishUnited States
                        RT_ICON0x55e500x25a8dataEnglishUnited States
                        RT_ICON0x583f80x10a8dataEnglishUnited States
                        RT_ICON0x594a00x988dataEnglishUnited States
                        RT_ICON0x59e280x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                        RT_DIALOG0x5a2900x100dataEnglishUnited States
                        RT_DIALOG0x5a3900x11cdataEnglishUnited States
                        RT_DIALOG0x5a4b00x60dataEnglishUnited States
                        RT_GROUP_ICON0x5a5100x84dataEnglishUnited States
                        RT_MANIFEST0x5a5980x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                        DLLImport
                        KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                        USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                        GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                        SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                        ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                        ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 28, 2022 22:58:24.890789032 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:24.997864008 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:24.997980118 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:24.998714924 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:25.105684996 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:26.107038975 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:26.157881021 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:26.395558119 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:26.502643108 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:26.504776955 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:26.548563004 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:31.579303026 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:31.579343081 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:31.579423904 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:31.784770012 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:31.784828901 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:31.851633072 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:31.851756096 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:31.859472990 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:31.859491110 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:31.859792948 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:31.908432007 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.253535032 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.293876886 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.310333014 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.310395956 CET44349767172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.310501099 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.312599897 CET49767443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.612637043 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:32.720123053 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:32.722467899 CET49768443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.722501040 CET44349768172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.722570896 CET49768443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.723259926 CET49768443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.723273993 CET44349768172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.782681942 CET44349768172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.783422947 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:32.787319899 CET49768443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.787341118 CET44349768172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.869673014 CET44349768172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.869745016 CET44349768172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:32.869796038 CET49768443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:32.870642900 CET49768443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:33.032286882 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:33.179436922 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:34.140746117 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:34.143275023 CET49771443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:34.143309116 CET44349771172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:34.143461943 CET49771443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:34.144083977 CET49771443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:34.144095898 CET44349771172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:34.189805984 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:34.201689005 CET44349771172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:34.205882072 CET49771443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:34.205914021 CET44349771172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:34.297683954 CET44349771172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:34.297745943 CET44349771172.67.188.154192.168.2.6
                        Jan 28, 2022 22:58:34.297816038 CET49771443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:34.299369097 CET49771443192.168.2.6172.67.188.154
                        Jan 28, 2022 22:58:34.473042965 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:34.580162048 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:34.582495928 CET8049765193.122.130.0192.168.2.6
                        Jan 28, 2022 22:58:34.783631086 CET4976580192.168.2.6193.122.130.0
                        Jan 28, 2022 22:58:47.591551065 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:47.697566986 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:47.697777033 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.110239029 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.110796928 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.216931105 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.217237949 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.327102900 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.327589989 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.445997953 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.446093082 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.446152925 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.446197987 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.446212053 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.446261883 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.448787928 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.490778923 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:48.597718000 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:48.722250938 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.238198042 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.344417095 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:49.345946074 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.452629089 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:49.453331947 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.563846111 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:49.564388037 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.670528889 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:49.671036005 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.778487921 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:49.778985977 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.885102034 CET5874977372.55.153.12192.168.2.6
                        Jan 28, 2022 22:58:49.888565063 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.888782024 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.888895988 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.889003992 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.889116049 CET49773587192.168.2.672.55.153.12
                        Jan 28, 2022 22:58:49.889202118 CET49773587192.168.2.672.55.153.12
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 28, 2022 22:58:24.816169024 CET5602353192.168.2.68.8.8.8
                        Jan 28, 2022 22:58:24.832462072 CET53560238.8.8.8192.168.2.6
                        Jan 28, 2022 22:58:24.846574068 CET5838453192.168.2.68.8.8.8
                        Jan 28, 2022 22:58:24.864696026 CET53583848.8.8.8192.168.2.6
                        Jan 28, 2022 22:58:31.554725885 CET5606153192.168.2.68.8.8.8
                        Jan 28, 2022 22:58:31.577200890 CET53560618.8.8.8192.168.2.6
                        Jan 28, 2022 22:58:47.483210087 CET5406453192.168.2.68.8.8.8
                        Jan 28, 2022 22:58:47.590255976 CET53540648.8.8.8192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jan 28, 2022 22:58:24.816169024 CET192.168.2.68.8.8.80xbd46Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.846574068 CET192.168.2.68.8.8.80xb224Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:31.554725885 CET192.168.2.68.8.8.80xeb4cStandard query (0)freegeoip.appA (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:47.483210087 CET192.168.2.68.8.8.80xb01aStandard query (0)serv3.devmexico.comA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jan 28, 2022 22:58:24.832462072 CET8.8.8.8192.168.2.60xbd46No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                        Jan 28, 2022 22:58:24.832462072 CET8.8.8.8192.168.2.60xbd46No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.832462072 CET8.8.8.8192.168.2.60xbd46No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.832462072 CET8.8.8.8192.168.2.60xbd46No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.832462072 CET8.8.8.8192.168.2.60xbd46No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.832462072 CET8.8.8.8192.168.2.60xbd46No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.864696026 CET8.8.8.8192.168.2.60xb224No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                        Jan 28, 2022 22:58:24.864696026 CET8.8.8.8192.168.2.60xb224No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.864696026 CET8.8.8.8192.168.2.60xb224No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.864696026 CET8.8.8.8192.168.2.60xb224No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.864696026 CET8.8.8.8192.168.2.60xb224No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:24.864696026 CET8.8.8.8192.168.2.60xb224No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:31.577200890 CET8.8.8.8192.168.2.60xeb4cNo error (0)freegeoip.app172.67.188.154A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:31.577200890 CET8.8.8.8192.168.2.60xeb4cNo error (0)freegeoip.app104.21.19.200A (IP address)IN (0x0001)
                        Jan 28, 2022 22:58:47.590255976 CET8.8.8.8192.168.2.60xb01aNo error (0)serv3.devmexico.com72.55.153.12A (IP address)IN (0x0001)
                        • freegeoip.app
                        • checkip.dyndns.org
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649767172.67.188.154443C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.649768172.67.188.154443C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.649771172.67.188.154443C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        3192.168.2.649765193.122.130.080C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData
                        Jan 28, 2022 22:58:24.998714924 CET1229OUTGET / HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                        Host: checkip.dyndns.org
                        Connection: Keep-Alive
                        Jan 28, 2022 22:58:26.107038975 CET1229INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:26 GMT
                        Content-Type: text/html
                        Content-Length: 106
                        Connection: keep-alive
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>
                        Jan 28, 2022 22:58:26.395558119 CET1230OUTGET / HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                        Host: checkip.dyndns.org
                        Jan 28, 2022 22:58:26.504776955 CET1230INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:26 GMT
                        Content-Type: text/html
                        Content-Length: 106
                        Connection: keep-alive
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>
                        Jan 28, 2022 22:58:32.612637043 CET1243OUTGET / HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                        Host: checkip.dyndns.org
                        Jan 28, 2022 22:58:32.720123053 CET1244INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:32 GMT
                        Content-Type: text/html
                        Content-Length: 106
                        Connection: keep-alive
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>
                        Jan 28, 2022 22:58:33.032286882 CET1246OUTGET / HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                        Host: checkip.dyndns.org
                        Jan 28, 2022 22:58:34.140746117 CET1269INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:34 GMT
                        Content-Type: text/html
                        Content-Length: 106
                        Connection: keep-alive
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>
                        Jan 28, 2022 22:58:34.473042965 CET1272OUTGET / HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                        Host: checkip.dyndns.org
                        Jan 28, 2022 22:58:34.582495928 CET1272INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:34 GMT
                        Content-Type: text/html
                        Content-Length: 106
                        Connection: keep-alive
                        Cache-Control: no-cache
                        Pragma: no-cache
                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649767172.67.188.154443C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData
                        2022-01-28 21:58:32 UTC0OUTGET /xml/102.129.143.61 HTTP/1.1
                        Host: freegeoip.app
                        Connection: Keep-Alive
                        2022-01-28 21:58:32 UTC0INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:32 GMT
                        Content-Type: application/xml
                        Content-Length: 350
                        Connection: close
                        ratelimit-reset: 88
                        x-ratelimit-limit-hour: 1200
                        x-ratelimit-remaining-hour: 1190
                        ratelimit-limit: 1200
                        ratelimit-remaining: 1190
                        vary: Origin
                        vary: Origin
                        x-database-date: Tue, 02 Nov 2021 10:43:29 GMT
                        access-control-allow-origin: *
                        x-kong-upstream-latency: 1
                        x-kong-proxy-latency: 0
                        via: kong/2.5.1
                        CF-Cache-Status: DYNAMIC
                        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=j2PfwsvFv9n7BxsHp6lgexujqzIU%2BB2r5RAdmibkjU3SH9K1eYie7LdajoeitvB%2FFwjkjwnzqnnSmVIQ0A5tP%2BFViRXg1adk5krEXfywXc7%2BdkeVDZMKIdYgaRnpiNtA"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 6d4d7b93aace4071-LHR
                        alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                        2022-01-28 21:58:32 UTC1INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 43 48 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 53 77 69 74 7a 65 72 6c 61 6e 64 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 5a 47 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 5a 75 67 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 48 75 6e 65 6e 62 65 72 67 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 33 33 31 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 5a 75 72 69 63 68 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61
                        Data Ascii: <Response><IP>102.129.143.61</IP><CountryCode>CH</CountryCode><CountryName>Switzerland</CountryName><RegionCode>ZG</RegionCode><RegionName>Zug</RegionName><City>Hunenberg</City><ZipCode>6331</ZipCode><TimeZone>Europe/Zurich</TimeZone><La


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.649768172.67.188.154443C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData
                        2022-01-28 21:58:32 UTC1OUTGET /xml/102.129.143.61 HTTP/1.1
                        Host: freegeoip.app
                        2022-01-28 21:58:32 UTC1INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:32 GMT
                        Content-Type: application/xml
                        Content-Length: 350
                        Connection: close
                        ratelimit-reset: 88
                        x-ratelimit-limit-hour: 1200
                        x-ratelimit-remaining-hour: 1189
                        ratelimit-limit: 1200
                        ratelimit-remaining: 1189
                        vary: Origin
                        vary: Origin
                        x-database-date: Tue, 02 Nov 2021 10:43:29 GMT
                        access-control-allow-origin: *
                        x-kong-upstream-latency: 0
                        x-kong-proxy-latency: 1
                        via: kong/2.5.1
                        CF-Cache-Status: DYNAMIC
                        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Ljsb7Dn8%2Fn%2FCcEKgM%2BHylIh3PWBrZaFLcpzFy%2FXm0hVoXF74%2FeUno0MX1BpmYp4jd8K%2FR0hU%2B5qKiMtCuMGLF3d7Uit6%2Fxxz44yOlo1mihyvZVxfrcy55Wt%2Bq2fMdnE%2F"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 6d4d7b972dcb72c7-LHR
                        alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                        2022-01-28 21:58:32 UTC2INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 43 48 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 53 77 69 74 7a 65 72 6c 61 6e 64 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 5a 47 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 5a 75 67 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 48 75 6e 65 6e 62 65 72 67 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 33 33 31 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 5a 75 72 69 63 68 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61
                        Data Ascii: <Response><IP>102.129.143.61</IP><CountryCode>CH</CountryCode><CountryName>Switzerland</CountryName><RegionCode>ZG</RegionCode><RegionName>Zug</RegionName><City>Hunenberg</City><ZipCode>6331</ZipCode><TimeZone>Europe/Zurich</TimeZone><La


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.649771172.67.188.154443C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        TimestampkBytes transferredDirectionData
                        2022-01-28 21:58:34 UTC2OUTGET /xml/102.129.143.61 HTTP/1.1
                        Host: freegeoip.app
                        2022-01-28 21:58:34 UTC2INHTTP/1.1 200 OK
                        Date: Fri, 28 Jan 2022 21:58:34 GMT
                        Content-Type: application/xml
                        Content-Length: 350
                        Connection: close
                        ratelimit-reset: 86
                        x-ratelimit-limit-hour: 1200
                        x-ratelimit-remaining-hour: 1188
                        ratelimit-limit: 1200
                        ratelimit-remaining: 1188
                        vary: Origin
                        vary: Origin
                        x-database-date: Tue, 02 Nov 2021 10:43:29 GMT
                        access-control-allow-origin: *
                        x-kong-upstream-latency: 0
                        x-kong-proxy-latency: 1
                        via: kong/2.5.1
                        CF-Cache-Status: DYNAMIC
                        Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kfmR1tNpcRoAplapWH0vlyViEp72BmF%2B0UT2iE%2FhJU060%2BlxD7tccgO%2BPRCrRHy5gqc7d4F5SA5YRPcRMgRGHoyZvR%2FLZKBGW94hBfPeHvPkoghio%2BysYA6P74X44Gtl"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 6d4d7ba008c07198-LHR
                        alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                        2022-01-28 21:58:34 UTC3INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 43 48 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 53 77 69 74 7a 65 72 6c 61 6e 64 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 5a 47 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 5a 75 67 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 48 75 6e 65 6e 62 65 72 67 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 33 33 31 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 5a 75 72 69 63 68 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61
                        Data Ascii: <Response><IP>102.129.143.61</IP><CountryCode>CH</CountryCode><CountryName>Switzerland</CountryName><RegionCode>ZG</RegionCode><RegionName>Zug</RegionName><City>Hunenberg</City><ZipCode>6331</ZipCode><TimeZone>Europe/Zurich</TimeZone><La


                        TimestampSource PortDest PortSource IPDest IPCommands
                        Jan 28, 2022 22:58:48.110239029 CET5874977372.55.153.12192.168.2.6220-serv3.devmexico.com ESMTP Exim 4.93 #2 Fri, 28 Jan 2022 15:58:48 -0600
                        220-We do not authorize the use of this system to transport unsolicited,
                        220 and/or bulk e-mail.
                        Jan 28, 2022 22:58:48.110796928 CET49773587192.168.2.672.55.153.12EHLO 266904
                        Jan 28, 2022 22:58:48.216931105 CET5874977372.55.153.12192.168.2.6250-serv3.devmexico.com Hello 266904 [102.129.143.61]
                        250-SIZE 52428800
                        250-8BITMIME
                        250-PIPELINING
                        250-STARTTLS
                        250 HELP
                        Jan 28, 2022 22:58:48.217237949 CET49773587192.168.2.672.55.153.12STARTTLS
                        Jan 28, 2022 22:58:48.327102900 CET5874977372.55.153.12192.168.2.6220 TLS go ahead

                        Click to jump to process

                        Target ID:0
                        Start time:22:58:03
                        Start date:28/01/2022
                        Path:C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe"
                        Imagebase:0x400000
                        File size:475331 bytes
                        MD5 hash:B9A4DBF6BB05C4FE97BA541DCF555E70
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector, Description: Detects executables packed with ConfuserEx Mod Beds Protector, Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: MALWARE_Win_Matiex, Description: Matiex/XetimaLogger keylogger payload, Source: 00000000.00000002.380778490.000000001AE60000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low

                        Target ID:1
                        Start time:22:58:05
                        Start date:28/01/2022
                        Path:C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\40987654323456789098746789098765432345678.exe"
                        Imagebase:0x400000
                        File size:475331 bytes
                        MD5 hash:B9A4DBF6BB05C4FE97BA541DCF555E70
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.621807758.0000000002541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector, Description: Detects executables packed with ConfuserEx Mod Beds Protector, Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: MALWARE_Win_Matiex, Description: Matiex/XetimaLogger keylogger payload, Source: 00000001.00000002.623039774.0000000004980000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000002.623168342.0000000004A22000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000002.622699924.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000000.369005405.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000000.369853457.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000000.369853457.0000000000414000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000002.621102168.0000000000769000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Matiex, Description: Yara detected Matiex Keylogger, Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector, Description: Detects executables packed with ConfuserEx Mod Beds Protector, Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: MALWARE_Win_Matiex, Description: Matiex/XetimaLogger keylogger payload, Source: 00000001.00000002.620796769.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low

                        No disassembly