Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.MSILHeracles.37401.28222.31688

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.MSILHeracles.37401.28222.31688 (renamed file extension from 31688 to exe)
Analysis ID:640279
MD5:9c10bef611a483bc74ad92c9e8556f75
SHA1:959200c9b9bc114c9eabba65d3cdd0cb682432f7
SHA256:0b54ceec5383b80e59b25a7b2b3a4a04211598ce4de90e03286f8310392c0e41
Tags:exe
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Tries to steal Crypto Currency Wallets
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
.NET source code contains very large array initializations
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Enables debug privileges
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"C2 url": ["185.222.58.90:17910"], "Bot Id": "Lxx"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.326819931.0000000004360000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000002.326819931.0000000004360000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000004.00000000.306626308.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                      • 0x1048a:$u7: RunPE
                      • 0x13b41:$u8: DownloadAndEx
                      • 0x9130:$pat14: , CommandLine:
                      • 0x13079:$v2_1: ListOfProcesses
                      • 0x1068b:$v2_2: get_ScanVPN
                      • 0x1072e:$v2_2: get_ScanFTP
                      • 0x1141e:$v2_2: get_ScanDiscord
                      • 0x1240c:$v2_2: get_ScanSteam
                      • 0x12428:$v2_2: get_ScanTelegram
                      • 0x124ce:$v2_2: get_ScanScreen
                      • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
                      • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
                      • 0x13509:$v2_2: get_ScanBrowsers
                      • 0x135ca:$v2_2: get_ScannedWallets
                      • 0x135f0:$v2_2: get_ScanWallets
                      • 0x13610:$v2_3: GetArguments
                      • 0x11cd9:$v2_4: VerifyUpdate
                      • 0x165e6:$v2_4: VerifyUpdate
                      • 0x139ca:$v2_5: VerifyScanRequest
                      • 0x130c6:$v2_6: GetUpdates
                      • 0x165c7:$v2_6: GetUpdates
                      4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                        Click to see the 36 entries
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeVirustotal: Detection: 31%Perma Link
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.58.90:17910"], "Bot Id": "Lxx"}

                        Exploits

                        barindex
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4bf7a68.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6388, type: MEMORYSTR
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                        Source: Binary string: E:\A\_work\1\s\obj\Release\Microsoft.Tools.ServiceModel.Svcutil\Microsoft.Tools.ServiceModel.Svcutil.pdb source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe

                        Networking

                        barindex
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpack, type: UNPACKEDPE
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:17910Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.58.90:17910Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.58.90:17910Content-Length: 1129292Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.58.90:17910Content-Length: 1129284Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficTCP traffic: 192.168.2.3:49746 -> 185.222.58.90:17910
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ium PDF Plugin","versions":[{"comment":"Chromium PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"divx-player":{"group_name_matcher":"*DivX Web Player*","help_url":"https://support.google.com/chrome/?p=plugin_divx","lang":"en-US","mime_types":["video/divx","video/x-matroska"],"name":"DivX Web Player","url":"http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe","versions":[{"status":"requires_authorization","version":"1.4.3.4"}]},"facebook-video-calling":{"group_name_matcher":"*Facebook Video*","lang":"en-US","mime_types":["application/skypesdk-plugin"],"name":"Facebook Video Calling","url":"https://www.facebook.com/chat/video/videocalldownload.php","versions":[{"comment":"We do not track version information for the Facebook Video Calling Plugin.","status":"requires_authorization","version":"0"}]},"google-chrome-pdf":{"group_name_matcher":"*Chrome PDF Viewer*","mime_types":[],"name":"Chrome PDF Viewer","versions":[{"comment":"Google Chrome PDF Viewer has no version information.","status":"fully_trusted","version":"0"}]},"google-chrome-pdf-plugin":{"group_name_matcher":"*Chrome PDF Plugin*","mime_types":[],"name":"Chrome PDF Plugin","versions":[{"comment":"Google Chrome PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"google-earth":{"group_name_matcher":"*Google Earth*","lang":"en-US","mime_types":["application/geplugin"],"name":"Google Earth","url":"http://www.google.com/earth/explore/products/plugin.html","versions":[{"comment":"We do not track version information for the Google Earth Plugin.","status":"requires_authorization","version":"0"}]},"google-talk":{"group_name_matcher":"*Google Talk*","mime_types":[],"name":"Google Talk","versions":[{"comment":"'Google Talk Plugin' and 'Google Talk Plugin Video Accelerator' use two completely different versioning schemes, so we can't define a minimum version.","status":"requires_authorization","version":"0"}]},"google-update":{"group_name_matcher":"Google Update","mime-types":[],"name":"Google Update","versions":[{"comment":"Google Update plugin is versioned but kept automatically up to date","status":"requires_authorization","version":"0"}]},"ibm-java-runtime-environment":{"group_name_matcher":"*IBM*Java*","mime_types":["application/x-java-applet","application/x-java-applet;jpi-version=1.7.0_05","application/x-java-applet;version=1.1","application/x-java-applet;version=1.1.1","application/x-java-applet;version=1.1.2","application/x-java-applet;version=1.1.3","application/x-java-applet;version=1.2","application/x-java-applet;version=1.2.1","application/x-java-applet;version=1.2.2","application/x-java-applet;version=1.3","application/x-java-applet;version=1.3.1","application/x-java-applet;version=1.4","application/x-java-applet;version=1.4.1","application/x-java-applet;version=1.4.2","application/x-java-applet;version=1.5","application/x-java-applet;version=1.6","application/x-java-applet;version=1.7","application/x-java
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: l9https://www.facebook.com/chat/video/videocalldownload.php equals www.facebook.com (Facebook)
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415396238.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:17910
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:17910/
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://appldnld.apple.com/QuickTime/041-3089.20111026.Sxpr4/QuickTimeInstaller.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.414737521.00000000012F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://forms.rea
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://forms.real.com/real/realone/download.html?type=rpsp_us
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://go.mic
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.382700486.0000000008901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413656681.0000000008910000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413733781.0000000008911000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413677512.0000000008910000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.ado/1
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.382700486.0000000008901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413656681.0000000008910000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413733781.0000000008911000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413677512.0000000008910000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/g
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.382700486.0000000008901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413656681.0000000008910000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413733781.0000000008911000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000003.413677512.0000000008910000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.cobj
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://schemas.datacontract.org/2004/07/
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/D
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://service.r
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://service.real.com/realplayer/security/02062012_player/en/
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://support.a
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://support.apple.com/kb/HT203092
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415396238.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415396238.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415396238.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415200414.0000000002F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/t_
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/earth/explore/products/plugin.html
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.interoperabilitybridges.com/wmp-extension-for-chrome
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: https://api.ipify.orgcoo
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.421118786.00000000066D2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.421118786.00000000066D2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://get.adob
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://helpx.ad
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_divx
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_java
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_pdf
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_quicktime
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_real
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_shockwave
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415771506.0000000003223000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415510372.00000000030BD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415666003.0000000003199000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_wmp
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6258784
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416523305.0000000003354000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.416763620.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415906539.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417142204.0000000003486000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.417610660.000000000351F000.00000004.00000800.00020000.00000000.sdmp, tmp8CBC.tmp.4.dr, tmpF2F9.tmp.4.dr, tmpE78F.tmp.4.dr, tmpC05F.tmp.4.dr, tmpCA33.tmp.4.dr, tmp5762.tmp.4.dr, tmpBA24.tmp.4.dr, tmpBD42.tmp.4.dr, tmp2054.tmp.4.dr, tmp658B.tmp.4.dr, tmpC2F1.tmp.4.dr, tmpC225.tmp.4.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                        Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:17910Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                        Source: unknownDNS traffic detected: queries for: api.ip.sb

                        System Summary

                        barindex
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4bf7a68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4bf7a68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, McVLOcXcbRNWQVWQI/PTXbSLWUVIhaPSYMa.csLarge array initialization: ZcNVeeLWOTPhgMQUf: array initializer size 398848
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.cf0000.0.unpack, McVLOcXcbRNWQVWQI/PTXbSLWUVIhaPSYMa.csLarge array initialization: ZcNVeeLWOTPhgMQUf: array initializer size 398848
                        Source: 0.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.cf0000.0.unpack, McVLOcXcbRNWQVWQI/PTXbSLWUVIhaPSYMa.csLarge array initialization: ZcNVeeLWOTPhgMQUf: array initializer size 398848
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.cf0000.9.unpack, McVLOcXcbRNWQVWQI/PTXbSLWUVIhaPSYMa.csLarge array initialization: ZcNVeeLWOTPhgMQUf: array initializer size 398848
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4bf7a68.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4bf7a68.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                        Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032425780_2_03242578
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_03248B700_2_03248B70
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_0324A9D00_2_0324A9D0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_0324EAE80_2_0324EAE8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_0324EF970_2_0324EF97
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_0324AEC80_2_0324AEC8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B27200_2_032B2720
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B54200_2_032B5420
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B34780_2_032B3478
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B14A00_2_032B14A0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B73A00_2_032B73A0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B09600_2_032B0960
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F663804_2_02F66380
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F690D04_2_02F690D0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F649004_2_02F64900
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F677304_2_02F67730
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F677384_2_02F67738
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_060E84404_2_060E8440
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_060E15A84_2_060E15A8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_060E68704_2_060E6870
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.320490571.0000000000E8C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Tools.ServiceModel.Svcutil.dllZ vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.324498966.00000000034B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGVAn PyU.exe2 vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.326819931.0000000004360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.326770233.0000000004315000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGVAn PyU.exe2 vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.326707986.00000000042F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGVAn PyU.exe2 vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.298722830.0000000000E8C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Tools.ServiceModel.Svcutil.dllZ vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGVAn PyU.exe2 vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.415396238.0000000003011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeBinary or memory string: OriginalFilenameMicrosoft.Tools.ServiceModel.Svcutil.dllZ vs SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeVirustotal: Detection: 31%
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe"
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.logJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4871.tmpJump to behavior
                        Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@4/27@2/1
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_01
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeBinary or memory string: .csprojMSystem.Runtime.InteropServices.PInvokeIMicrosoft.EntityFrameworkCore.Design]Microsoft.EntityFrameworkCore.SqlServer.DesignGMicrosoft.EntityFrameworkCore.ToolsaMicrosoft.VisualStudio.Web.CodeGeneration.DesignEdotnet-aspnet-codegenerator-design
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeBinary or memory string: .csproj
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: #EndpointReferenceahttp://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeString found in binary or memory: wsa`http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic file information: File size 1693696 > 1048576
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x199000
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: E:\A\_work\1\s\obj\Release\Microsoft.Tools.ServiceModel.Svcutil\Microsoft.Tools.ServiceModel.Svcutil.pdb source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032468E0 push C30170BEh; ret 0_2_032469CB
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 0_2_032B49F0 push eax; mov dword ptr [esp], edx0_2_032B4A01
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F6E1F2 push eax; retf 4_2_02F6E1F9
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F6E1F0 pushad ; retf 4_2_02F6E1F1
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_02F6B5C0 push cs; ret 4_2_02F6B5F4
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeStatic PE information: 0x8F451F1E [Sat Mar 3 06:37:18 2046 UTC]
                        Source: initial sampleStatic PE information: section name: .text entropy: 7.00948681811

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (67).png
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: localgroup administrators aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6388, type: MEMORYSTR
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.322194403.00000000032F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe TID: 6408Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe TID: 6384Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeRegistry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWindow / User API: threadDelayed 1954Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWindow / User API: threadDelayed 7006Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.421118786.00000000066D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\EnumNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000000.00000002.327098624.0000000004BEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.421118786.00000000066D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareGM5U1TN2Win32_VideoControllerOM9_ZBOCVideoController120060621000000.000000-0003374.727display.infMSBDAN_6V7XZYPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsML3XU8WR]
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.414737521.00000000012F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeCode function: 4_2_060EC798 LdrInitializeThunk,4_2_060EC798
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                        Source: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe, 00000004.00000002.420767295.0000000006634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.326819931.0000000004360000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.306626308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.413960092.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.326770233.0000000004315000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.326707986.00000000042F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.305776907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6388, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6568, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.326819931.0000000004360000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.306626308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.413960092.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.326770233.0000000004315000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.326707986.00000000042F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.305776907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6388, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6568, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.4315550.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.42f5530.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe.400000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.326819931.0000000004360000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.302735458.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.306626308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.304627336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.413960092.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.326770233.0000000004315000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.415272531.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.326707986.00000000042F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.305776907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6388, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exe PID: 6568, type: MEMORYSTR
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid Accounts221
                        Windows Management Instrumentation
                        Path Interception111
                        Process Injection
                        11
                        Masquerading
                        1
                        OS Credential Dumping
                        331
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        Exfiltration Over Other Network Medium1
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default Accounts2
                        Command and Scripting Interpreter
                        Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                        Disable or Modify Tools
                        LSASS Memory11
                        Process Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        Exfiltration Over Bluetooth11
                        Non-Standard Port
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)231
                        Virtualization/Sandbox Evasion
                        Security Account Manager231
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                        Non-Application Layer Protocol
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer2
                        Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                        Hidden Users
                        LSA Secrets1
                        Remote System Discovery
                        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.common2
                        Obfuscated Files or Information
                        Cached Domain Credentials123
                        System Information Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                        Software Packing
                        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                        Timestomp
                        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.